RHEL 6 : java-1.8.0-ibm (RHSA-2019:4113)

critical Nessus Plugin ID 131919

Synopsis

The remote Red Hat host is missing one or more security updates for java-1.8.0-ibm.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2019:4113 advisory.

- OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945)

- OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962)

- OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964)

- OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973)

- OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975)

- OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978)

- OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981)

- OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983)

- OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988)

- OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989)

- OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992)

- Oracle JDK: unspecified vulnerability fixed in 8u221 (Deployment) (CVE-2019-2996)

- OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999)

- IBM JDK: Unrestricted access to diagnostic operations (CVE-2019-17631)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL java-1.8.0-ibm package based on the guidance in RHSA-2019:4113.

See Also

http://www.nessus.org/u?45614ea7

https://access.redhat.com/errata/RHSA-2019:4113

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=1760963

https://bugzilla.redhat.com/show_bug.cgi?id=1760969

https://bugzilla.redhat.com/show_bug.cgi?id=1760978

https://bugzilla.redhat.com/show_bug.cgi?id=1760980

https://bugzilla.redhat.com/show_bug.cgi?id=1760992

https://bugzilla.redhat.com/show_bug.cgi?id=1760999

https://bugzilla.redhat.com/show_bug.cgi?id=1761006

https://bugzilla.redhat.com/show_bug.cgi?id=1761146

https://bugzilla.redhat.com/show_bug.cgi?id=1761262

https://bugzilla.redhat.com/show_bug.cgi?id=1761266

https://bugzilla.redhat.com/show_bug.cgi?id=1761596

https://bugzilla.redhat.com/show_bug.cgi?id=1761601

https://bugzilla.redhat.com/show_bug.cgi?id=1778942

https://bugzilla.redhat.com/show_bug.cgi?id=1779880

Plugin Details

Severity: Critical

ID: 131919

File Name: redhat-RHSA-2019-4113.nasl

Version: 1.4

Type: local

Agent: unix

Published: 12/10/2019

Updated: 4/28/2024

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

CVSS Score Source: CVE-2019-17631

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm-demo, p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm-devel, p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm-jdbc, p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm-plugin, p-cpe:/a:redhat:enterprise_linux:java-1.8.0-ibm-src, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 12/9/2019

Vulnerability Publication Date: 10/16/2019

Reference Information

CVE: CVE-2019-17631, CVE-2019-2945, CVE-2019-2962, CVE-2019-2964, CVE-2019-2973, CVE-2019-2975, CVE-2019-2978, CVE-2019-2981, CVE-2019-2983, CVE-2019-2988, CVE-2019-2989, CVE-2019-2992, CVE-2019-2996, CVE-2019-2999

CWE: 190, 248, 285, 476, 770, 79

RHSA: 2019:4113