English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 90895 CVE descriptions
and 50192 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.66242
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2009:1582
Summary:Redhat Security Advisory RHSA-2009:1582
Description:Description:
The remote host is missing updates announced in
advisory RHSA-2009:1582.

The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and
the IBM Java 2 Software Development Kit.

This update fixes several vulnerabilities in the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit. These
vulnerabilities are summarized on the IBM Security alerts page listed in
the References section. (CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,
CVE-2009-2672, CVE-2009-2673, CVE-2009-2674, CVE-2009-2675, CVE-2009-2676)

All users of java-1.6.0-ibm are advised to upgrade to these updated
packages, containing the IBM 1.6.0 SR6 Java release. All running instances
of IBM Java must be restarted for the update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2009-1582.html
http://www.redhat.com/security/updates/classification/#critical
http://www.ibm.com/developerworks/java/jdk/alerts/

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-2625
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
http://www.openwall.com/lists/oss-security/2009/09/06/1
http://www.openwall.com/lists/oss-security/2009/10/22/9
http://www.openwall.com/lists/oss-security/2009/10/23/6
http://www.openwall.com/lists/oss-security/2009/10/26/3
http://www.cert.fi/en/reports/2009/vulnerability2009085.html
http://www.codenomicon.com/labs/xml/
http://www.networkworld.com/columnists/2009/080509-xml-flaw.html
http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html
Debian Security Information: DSA-1984 (Google Search)
http://www.debian.org/security/2010/dsa-1984
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html
HPdes Security Advisory: HPSBUX02476
http://marc.info/?l=bugtraq&m=125787273209737&w=2
HPdes Security Advisory: SSRT090250
http://www.mandriva.com/security/advisories?name=MDVSA-2009:209
http://www.mandriva.com/security/advisories?name=MDVSA-2011:108
RedHat Security Advisories: RHSA-2009:1199
https://rhn.redhat.com/errata/RHSA-2009-1199.html
RedHat Security Advisories: RHSA-2009:1200
https://rhn.redhat.com/errata/RHSA-2009-1200.html
RedHat Security Advisories: RHSA-2009:1201
https://rhn.redhat.com/errata/RHSA-2009-1201.html
http://www.redhat.com/support/errata/RHSA-2009-1615.html
RedHat Security Advisories: RHSA-2009:1636
https://rhn.redhat.com/errata/RHSA-2009-1636.html
RedHat Security Advisories: RHSA-2009:1637
https://rhn.redhat.com/errata/RHSA-2009-1637.html
RedHat Security Advisories: RHSA-2009:1649
https://rhn.redhat.com/errata/RHSA-2009-1649.html
RedHat Security Advisories: RHSA-2009:1650
https://rhn.redhat.com/errata/RHSA-2009-1650.html
http://www.redhat.com/support/errata/RHSA-2011-0858.html
RedHat Security Advisories: RHSA-2012:1232
http://rhn.redhat.com/errata/RHSA-2012-1232.html
RedHat Security Advisories: RHSA-2012:1537
http://rhn.redhat.com/errata/RHSA-2012-1537.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1
SuSE Security Announcement: SUSE-SR:2009:016 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html
SuSE Security Announcement: SUSE-SA:2009:053 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html
SuSE Security Announcement: SUSE-SR:2009:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
SuSE Security Announcement: SUSE-SR:2010:013 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://www.ubuntu.com/usn/USN-890-1
Cert/CC Advisory: TA09-294A
http://www.us-cert.gov/cas/techalerts/TA09-294A.html
Cert/CC Advisory: TA10-012A
http://www.us-cert.gov/cas/techalerts/TA10-012A.html
BugTraq ID: 35958
http://www.securityfocus.com/bid/35958
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8520
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9356
http://www.securitytracker.com/id?1022680
http://secunia.com/advisories/36162
http://secunia.com/advisories/36176
http://secunia.com/advisories/36180
http://secunia.com/advisories/36199
http://secunia.com/advisories/37300
http://secunia.com/advisories/37460
http://secunia.com/advisories/37671
http://secunia.com/advisories/37754
http://secunia.com/advisories/38342
http://secunia.com/advisories/38231
http://secunia.com/advisories/43300
http://secunia.com/advisories/50549
http://www.vupen.com/english/advisories/2009/2543
http://www.vupen.com/english/advisories/2009/3316
http://www.vupen.com/english/advisories/2011/0359
Common Vulnerability Exposure (CVE) ID: CVE-2009-2670
http://security.gentoo.org/glsa/glsa-200911-02.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263408-1
SuSE Security Announcement: SUSE-SA:2009:043 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html
BugTraq ID: 35939
http://www.securityfocus.com/bid/35939
http://osvdb.org/56788
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11326
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8022
http://www.securitytracker.com/id?1022658
http://secunia.com/advisories/36248
http://secunia.com/advisories/37386
XForce ISS Database: jre-jdk-audiosystem-priv-escalation(52306)
http://xforce.iss.net/xforce/xfdb/52306
Common Vulnerability Exposure (CVE) ID: CVE-2009-2671
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1
BugTraq ID: 35943
http://www.securityfocus.com/bid/35943
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11115
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8259
http://www.securitytracker.com/id?1022659
XForce ISS Database: sun-jre-socks-info-disclosure(52336)
http://xforce.iss.net/xforce/xfdb/52336
Common Vulnerability Exposure (CVE) ID: CVE-2009-2672
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7723
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9359
XForce ISS Database: sun-jre-proxy-session-hijacking(52337)
http://xforce.iss.net/xforce/xfdb/52337
Common Vulnerability Exposure (CVE) ID: CVE-2009-2673
http://osvdb.org/56785
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10263
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8558
XForce ISS Database: sun-jre-proxy-security-bypass(52338)
http://xforce.iss.net/xforce/xfdb/52338
Common Vulnerability Exposure (CVE) ID: CVE-2009-2674
http://www.zerodayinitiative.com/advisories/ZDI-09-050/
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263428-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10073
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8073
XForce ISS Database: sun-jre-jpeg-bo(52339)
http://xforce.iss.net/xforce/xfdb/52339
Common Vulnerability Exposure (CVE) ID: CVE-2009-2675
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=814
http://www.zerodayinitiative.com/advisories/ZDI-09-049/
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263488-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10840
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8415
XForce ISS Database: jre-pak200-bo(52307)
http://xforce.iss.net/xforce/xfdb/52307
Common Vulnerability Exposure (CVE) ID: CVE-2009-2676
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263490-1
BugTraq ID: 35946
http://www.securityfocus.com/bid/35946
http://osvdb.org/56789
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8453
http://www.securitytracker.com/id?1022657
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 50192 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2016 E-Soft Inc. All rights reserved.