LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 22nd, 2014
Linux Advisory Watch: September 19th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: 2013:095: java-1.7.0-openjdk Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Updated java-1.7.0-openjdk packages fix security vulnerabilities: Two improper permission check issues were discovered in the reflection API in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions (CVE-2012-3174, [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2013:095
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : java-1.7.0-openjdk
 Date    : April 10, 2013
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Updated java-1.7.0-openjdk packages fix security vulnerabilities:
 
 Two improper permission check issues were discovered in the reflection
 API in OpenJDK. An untrusted Java application or applet could use
 these flaws to bypass Java sandbox restrictions (CVE-2012-3174,
 CVE-2013-0422).
 
 Multiple improper permission check issues were discovered in the AWT,
 CORBA, JMX, Libraries, and Beans components in OpenJDK. An untrusted
 Java application or applet could use these flaws to bypass Java
 sandbox restrictions (CVE-2013-0442, CVE-2013-0445, CVE-2013-0441,
 CVE-2013-1475, CVE-2013-1476, CVE-2013-0429, CVE-2013-0450,
 CVE-2013-0425, CVE-2013-0426, CVE-2013-0428, CVE-2013-0444).
 
 Multiple flaws were found in the way image parsers in the 2D and AWT
 components handled image raster parameters. A specially-crafted image
 could cause Java Virtual Machine memory corruption and, possibly,
 lead to arbitrary code execution with the virtual machine privileges
 (CVE-2013-1478, CVE-2013-1480).
 
 A flaw was found in the AWT component's clipboard handling code. An
 untrusted Java application or applet could use this flaw to access
 clipboard data, bypassing Java sandbox restrictions (CVE-2013-0432).
 
 The default Java security properties configuration did not restrict
 access to certain com.sun.xml.internal packages. An untrusted Java
 application or applet could use this flaw to access information,
 bypassing certain Java sandbox restrictions. This update lists the
 whole package as restricted (CVE-2013-0435).
 
 Multiple improper permission check issues were discovered in the
 JMX, Libraries, Networking, and JAXP components. An untrusted Java
 application or applet could use these flaws to bypass certain Java
 sandbox restrictions (CVE-2013-0431, CVE-2013-0427, CVE-2013-0433,
 CVE-2013-0434).
 
 It was discovered that the RMI component's CGIHandler class used
 user inputs in error messages without any sanitization. An attacker
 could use this flaw to perform a cross-site scripting (XSS) attack
 (CVE-2013-0424).
 
 It was discovered that the SSL/TLS implementation in the JSSE component
 did not properly enforce handshake message ordering, allowing an
 unlimited number of handshake restarts. A remote attacker could use
 this flaw to make an SSL/TLS server using JSSE consume an excessive
 amount of CPU by continuously restarting the handshake (CVE-2013-0440).
 
 It was discovered that the JSSE component did not properly validate
 Diffie-Hellman public keys. An SSL/TLS client could possibly use this
 flaw to perform a small subgroup attack (CVE-2013-0443).
 
 Multiple improper permission check issues were discovered in the JMX
 and Libraries components in OpenJDK. An untrusted Java application
 or applet could use these flaws to bypass Java sandbox restrictions
 (CVE-2013-1486, CVE-2013-1484).
 
 An improper permission check issue was discovered in the Libraries
 component in OpenJDK. An untrusted Java application or applet could use
 this flaw to bypass certain Java sandbox restrictions (CVE-2013-1485).
 
 It was discovered that OpenJDK leaked timing information when
 decrypting TLS/SSL protocol encrypted records when CBC-mode cipher
 suites were used. A remote attacker could possibly use this flaw to
 retrieve plain text from the encrypted packets by using a TLS/SSL
 server as a padding oracle (CVE-2013-0169).
 
 An integer overflow flaw was found in the way the 2D component
 handled certain sample model instances. A specially-crafted sample
 model instance could cause Java Virtual Machine memory corruption
 and, possibly, lead to arbitrary code execution with virtual machine
 privileges (CVE-2013-0809).
 
 It was discovered that the 2D component did not properly reject certain
 malformed images. Specially-crafted raster parameters could cause Java
 Virtual Machine memory corruption and, possibly, lead to arbitrary
 code execution with virtual machine privileges (CVE-2013-1493).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0424
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0425
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0426
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0427
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0428
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0429
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0431
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0432
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0433
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0434
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0435
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0440
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0441
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0442
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0443
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0444
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0445
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0450
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0809
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1475
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1476
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1478
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1480
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1484
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1485
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1486
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493
 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0018
 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056
 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0084
 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0088
 _______________________________________________________________________

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 b951d387ee818e0b204cb1a239ac2ae1  mbs1/x86_64/java-1.7.0-openjdk-1.7.0.6-2.3.8.1.1.mbs1.x86_64.rpm
 00676ff0eefe12d69e0b93ee4f9ac8c4  mbs1/x86_64/java-1.7.0-openjdk-demo-1.7.0.6-2.3.8.1.1.mbs1.x86_64.rpm
 3733ddb46d4ba9fe639d90271c1113c3  mbs1/x86_64/java-1.7.0-openjdk-devel-1.7.0.6-2.3.8.1.1.mbs1.x86_64.rpm
 1d47fd14d7fe3a20d81c5cf808e75fe6  mbs1/x86_64/java-1.7.0-openjdk-javadoc-1.7.0.6-2.3.8.1.1.mbs1.noarch.rpm
 baab88a94f04c3c3f0fc322fe2562c9b  mbs1/x86_64/java-1.7.0-openjdk-src-1.7.0.6-2.3.8.1.1.mbs1.x86_64.rpm 
 d019dda16506ffb609ae8ce66a7cda7c  mbs1/SRPMS/java-1.7.0-openjdk-1.7.0.6-2.3.8.1.1.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Snowden: New Zealand Is Spying, Too
DDoS attackers turn fire on ISPs and gaming servers
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.