The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of Java JRE/JDK: several vulnerabilities

Synthesis of the vulnerability

Several vulnerabilities of Java JRE/JDK can be used by a malicious applet/application in order to execute code or to obtain information. A legitimate applet/application, handling malicious data, can also be forced to execute code.
Severity of this weakness: 3/4.
Number of vulnerabilities in this bulletin: 27.
Creation date: 17/10/2012.
Références of this bulletin: BID-55501, BID-55538, BID-56025, BID-56033, BID-56039, BID-56043, BID-56046, BID-56051, BID-56054, BID-56055, BID-56056, BID-56057, BID-56058, BID-56059, BID-56061, BID-56063, BID-56065, BID-56067, BID-56070, BID-56071, BID-56072, BID-56075, BID-56076, BID-56079, BID-56080, BID-56081, BID-56082, BID-56083, c03595351, CERTA-2012-AVI-576, CERTA-2012-AVI-746, CERTA-2013-AVI-094, CVE-2012-1531, CVE-2012-1532, CVE-2012-1533, CVE-2012-3143, CVE-2012-3159, CVE-2012-3216, CVE-2012-4416, CVE-2012-4420, CVE-2012-5067, CVE-2012-5068, CVE-2012-5069, CVE-2012-5070, CVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5074, CVE-2012-5075, CVE-2012-5076, CVE-2012-5077, CVE-2012-5079, CVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5085, CVE-2012-5086, CVE-2012-5087, CVE-2012-5088, CVE-2012-5089, CVE-2012-5979-ERROR, DSECRG-12-039, ESX350-201302401-SG, FEDORA-2012-16346, FEDORA-2012-16351, IC89804, javacpuoct2012, MDVSA-2012:169, openSUSE-SU-2012:1419-1, openSUSE-SU-2012:1423-1, openSUSE-SU-2012:1424-1, RHSA-2012:1384-01, RHSA-2012:1385-01, RHSA-2012:1386-01, RHSA-2012:1391-01, RHSA-2012:1392-01, RHSA-2012:1465-01, RHSA-2012:1466-01, RHSA-2012:1467-01, RHSA-2012:1485-01, RHSA-2013:1455-01, RHSA-2013:1456-01, SUSE-SU-2012:1398-1, SUSE-SU-2012:1489-1, SUSE-SU-2012:1489-2, SUSE-SU-2012:1490-1, SUSE-SU-2012:1588-1, SUSE-SU-2012:1595-1, swg21621958, swg21621959, VIGILANCE-VUL-12072, VMSA-2013-0001.2, VMSA-2013-0003.

Description of the vulnerability

Several vulnerabilities were announced in Java JRE/JDK. The most severe vulnerabilities lead to code execution.

An attacker can use a vulnerability of 2D, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-56025, CVE-2012-5083]

An attacker can use a vulnerability of 2D, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-56033, CVE-2012-1531]

An attacker can use a vulnerability of Beans, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-56039, CVE-2012-5086]

An attacker can use a vulnerability of Beans, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-56043, CVE-2012-5087]

An attacker can use a vulnerability of Deployment, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-56046, CVE-2012-1533]

An attacker can use a vulnerability of Deployment, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-56051, CVE-2012-1532]

An attacker can use the class com.sun.org.glassfish.gmbal.util.GenericConstructor in order to execute arbitrary JVM code. [severity:3/4; BID-56054, CVE-2012-5076]

An attacker can use a vulnerability of JMX, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-56055, CVE-2012-3143]

An attacker can use a vulnerability of Libraries, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-56057, CVE-2012-5088]

An attacker can use a vulnerability of JMX, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-56059, CVE-2012-5089]

An attacker can use a vulnerability of Swing, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-56063, CVE-2012-5084]

An attacker can use a vulnerability of Deployment, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-56072, CVE-2012-3159]

An attacker can use a vulnerability of Libraries, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-56076, CVE-2012-5068]

When a Java application uses an integer array, and the Arrays.fill() method, the array memory area is not initialized to zero by the JRE, so an attacker can obtain a fragment memory (VIGILANCE-VUL-11929). [severity:3/4; BID-55501, BID-55538, CVE-2012-4416, CVE-2012-4420]

An attacker can use a vulnerability of JAX-WS, in order to obtain or alter information. [severity:3/4; BID-56056, CVE-2012-5074]

An attacker can use a vulnerability of JMX, in order to obtain or alter information. [severity:3/4; BID-56061, CVE-2012-5071]

An attacker can use a vulnerability of Concurrency, in order to obtain or alter information. [severity:3/4; BID-56065, CVE-2012-5069]

An attacker can use a vulnerability of Deployment, in order to obtain information. [severity:2/4; BID-56070, CVE-2012-5067]

An attacker can use a vulnerability of JMX, in order to obtain information. [severity:2/4; BID-56079, CVE-2012-5070]

An attacker can use a vulnerability of JMX, in order to obtain information. [severity:2/4; BID-56081, CVE-2012-5075]

An attacker can use a vulnerability of Libraries, in order to alter information. [severity:2/4; BID-56080, CVE-2012-5073]

An attacker can use a vulnerability of Libraries, in order to alter information. [severity:2/4; BID-56082, CVE-2012-5079, CVE-2012-5979-ERROR]

An attacker can use a vulnerability of Security, in order to alter information. [severity:2/4; BID-56083, CVE-2012-5072]

An attacker can use a vulnerability of JSSE (ROBOT Attack VIGILANCE-VUL-24749), in order to create a denial of service. [severity:2/4; BID-56071, CVE-2012-5081]

An attacker can use a vulnerability of Libraries, in order to obtain information. [severity:1/4; BID-56075, CVE-2012-3216]

An attacker can use a vulnerability of Security, in order to obtain information. [severity:1/4; BID-56058, CVE-2012-5077]

An attacker can use a vulnerability of Gopher, in order to send packets. [severity:1/4; BID-56067, CVE-2012-5085, DSECRG-12-039]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This weakness impacts software or systems such as Fedora, HP-UX, WebSphere MQ, Junos Space, Junos Space Network Management Platform, Mandriva Linux, Windows (platform) ~ not comprehensive, Java OpenJDK, openSUSE, Java Oracle, Solaris, RHEL, SUSE Linux Enterprise Desktop, SLES, Unix (platform) ~ not comprehensive, ESX, VirtualCenter.

Our Vigil@nce team determined that the severity of this vulnerability announce is important.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 27 vulnerabilities.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a beginner ability can exploit this threat bulletin.

Solutions for this threat

Java JRE/JDK: version 7 Update 9.
The version 7 Update 9 is corrected:
  http://www.oracle.com/technetwork/java/javase/downloads/index.html

Java JRE/JDK: version 6 Update 37.
The version 6 Update 37 is corrected:
  http://www.oracle.com/technetwork/java/javase/downloads/index.html

Java JRE/JDK: version 5 Update 38.
The version 5 Update 38 is corrected:
  http://www.oracle.com/technetwork/java/javase/downloads/index.html
  http://www.oracle.com/technetwork/java/javase/documentation/overview-137139.html

Java JRE/JDK: version 1.4.2_40.
The version 1.4.2_40 is corrected:
  http://www.oracle.com/technetwork/java/javase/downloads/index.html
  http://www.oracle.com/technetwork/java/javase/documentation/overview-142120.html

IcedTea: versions 2.1.3, 2.2.3 and 2.3.3.
Versions 2.1.3, 2.2.3 and 2.3.3 are corrected:
  http://icedtea.classpath.org/download/source/icedtea-2.1.3.tar.gz
  http://icedtea.classpath.org/download/source/icedtea-2.2.3.tar.gz
  http://icedtea.classpath.org/download/source/icedtea-2.3.3.tar.gz

IcedTea6: version 1.11.5.
The version 1.11.5 is corrected:
  http://icedtea.classpath.org/download/source/icedtea6-1.11.5.tar.gz

IcedTea6: version 1.10.10.
The version 1.10.10 is corrected:
  http://icedtea.classpath.org/download/source/icedtea6-1.10.10.tar.gz

Fedora: new java-1.x.0-openjdk packages.
New packages are available:
  java-1.6.0-openjdk-1.6.0.0-68.1.11.5.fc16
  java-1.7.0-openjdk-1.7.0.9-2.3.3.fc16
  java-1.7.0-openjdk-1.7.0.9-2.3.3.fc17

HP-UX 11: Java update.
The versions v7.0.04, v6.0.17, and v5.0.27 are fixed:
  https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=HPUXJAVAHOME

IBM Java: versions 1.4.2 SR13-FP14, 5.0 SR15, 6 SR12, 6.0.1 SR4 and 7 SR3.
Versions 1.4.2 SR13-FP14, 5.0 SR15, 6 SR12, 6.0.1 SR4 and 7 SR3 are corrected:
  http://www.ibm.com/developerworks/views/java/downloads.jsp

Juniper Space: version 13.3R1.8.
The version 13.3R1.8 is fixed:
  http://www.juniper.net/

Mandriva: new java-1.6.0-openjdk packages.
New packages are available:
  java-1.6.0-openjdk-1.6.0.0-35.b24.1-mdv2011.0
  java-1.6.0-openjdk-1.6.0.0-35.b24.1mdvmes5.2

openSUSE: new java-1_x_0-openjdk packages.
New packages are available:
  openSUSE 11.4 : java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-21.1
  openSUSE 12.1 : java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-16.1
  openSUSE 12.2 : java-1_7_0-openjdk-1.7.0.6-3.16.1

Red Hat Satellite: new java-1.6.0-ibm packages.
New packages are available:
Red Hat Satellite (RHEL v.5):
  java-1.6.0-ibm-1.6.0.14.0-1jpp.1.el5_9
Red Hat Satellite (RHEL v.6):
  java-1.6.0-ibm-1.6.0.14.0-1jpp.1.el6_4

RHEL 5S, 6S: new java-1.6.0-sun packages.
New packages are available:
  java-1.6.0-sun-1.6.0.37-1jpp.1.el5_8
  java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3

RHEL 6S: new java-1.7.0-oracle packages.
New packages are available:
  java-1.7.0-oracle-1.7.0.9-1jpp.3.el6_3

RHEL: new java-1.x.0-ibm packages.
New packages are available:
  java-1.4.2-ibm-1.4.2.13.14-1jpp.1.el5_8
  java-1.5.0-ibm-1.5.0.15.0-1jpp.1.el5_8
  java-1.6.0-ibm-1.6.0.12.0-1jpp.1.el5_8
  java-1.5.0-ibm-1.5.0.15.0-1jpp.1.el6_3
  java-1.6.0-ibm-1.6.0.12.0-1jpp.1.el6_3
  java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3

RHEL: new java-1.x.0-openjdk packages.
New packages are available:
  java-1.6.0-openjdk-1.6.0.0-1.28.1.10.10.el5_8
  java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3
  java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1

Solaris 11.1: patch 11.1.2.5.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1513858.1

SUSE LE 10: new java-1_5_0-ibm packages.
New packages are available:
  java-1_5_0-ibm-1.5.0_sr15.0-0.5.1

SUSE LE 10: new java-1_6_0-ibm packages.
New packages are available:
  java-1_6_0-ibm-1.6.0_sr12.0-0.10.1

SUSE LE 11: new java-1_6_0-ibm packages.
New packages are available:
  java-1_6_0-ibm-1.6.0_sr12.0-0.5.1

SUSE LE 11: new java-1_6_0-openjdk packages.
New packages are available:
  java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1

SUSE LE 11: new java-1_7_0-ibm packages.
New packages are available:
  java-1_7_0-ibm-1.7.0_sr3.0-0.5.1

SUSE LE: new java-1_4_2-ibm packages.
New packages are available:
  SUSE LE 10 : java-1_4_2-ibm-1.4.2_sr13.14-0.5.1
  SUSE LE 11 : java-1_4_2-ibm-1.4.2_sr13.14-0.2.1

VMware ESX 3.5: patch ESX350-201302401-SG.
A patch is available:
  http://kb.vmware.com/kb/2042541

VMware VirtualCenter: version 2.5 Update 6c.
The version 2.5 Update 6c is fixed:
  http://downloads.vmware.com/d/info/datacenter_downloads/vmware_infrastructure_3/3_5

WebSphere MQ: patch for IBM JRE.
A patch is available:
  WebSphere MQ 7.0 :
    http://www-933.ibm.com/support/fixcentral/swg/quickorder?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+MQ&release=All&platform=All&function=aparId&apars=IC89804
  WebSphere MQ 7.1 :
    http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+MQ&release=All&platform=All&function=aparId&apars=IC88537
  WebSphere MQ 7.5 :
    http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+MQ&release=All&platform=All&function=aparId&apars=IC88537
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computer vulnerability workaround. The technology watch team tracks security threats targeting the computer system.