SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Java SE Vendors:   Oracle, Sun
(Oracle Issues Fix for Oracle Linux) Oracle Java SE Bugs Let Remote Usrs Access and Modify Data, Deny Service, and Gain Elevated Privileges
SecurityTracker Alert ID:  1037662
SecurityTracker URL:  http://securitytracker.com/id/1037662
CVE Reference:   CVE-2016-5546, CVE-2016-5547, CVE-2016-5548, CVE-2017-3241, CVE-2017-3252   (Links to External Site)
Date:  Jan 21 2017
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6u131, 7u121, 8u112
Description:   Multiple vulnerabilities were reported in Oracle Java SE. A remote user can access data on the target system. A remote user can modify data on the target system. A remote user can cause denial of service conditions on the target system. A remote user can gain elevated privileges.

A remote user can exploit a flaw in the Hotspot component to gain elevated privileges [CVE-2017-3289].

A remote user can exploit a flaw in the Libraries component to gain elevated privileges [CVE-2017-3272].

A remote user can exploit a flaw in the RMI component to gain elevated privileges [CVE-2017-3241].

A remote user can exploit a flaw in the AWT component to gain elevated privileges [CVE-2017-3260].

A remote user can exploit a flaw in the 2D component to cause denial of service conditions [CVE-2017-3253].

A remote user can exploit a flaw in the Libraries component to modify data [CVE-2016-5546].

A remote user can exploit a flaw in the Libraries component to access data [CVE-2016-5548, CVE-2016-5549].

A remote authenticated user can exploit a flaw in the JAAS component to modify data [CVE-2017-3252].

A remote user can exploit a flaw in the Java Mission Control component to partially access data [CVE-2017-3262].

A remote user can exploit a flaw in the Libraries component to cause partial denial of service conditions [CVE-2016-5547].

A remote user can exploit a flaw in the Networking component to partially modify data [CVE-2016-5552].

A remote user can exploit a flaw in the Networking component to partially access data [CVE-2017-3231, CVE-2017-3261].

A remote user can exploit a flaw in the Deployment component to partially access data [CVE-2017-3259].

A remote user can exploit a flaw in the Java Mission Control component to partially modify data [CVE-2016-8328].

The following researchers reported these and other Oracle product vulnerabilities:

Aleksandar Nikolic of Cisco Talos; Alexander Mirosh of Hewlett Packard Enterprise; Alvaro Munoz of Hewlett Packard Enterprise; Andrew Fowler of Lithium; Behzad Najjarpour Jabbari, Secunia Research at Flexera Software; Blessen Thomas of EY Global Delivery Services; Brian Martin of Tenable Network Security;
Daniel Bleichenbacher of Google; Daniel Fahlgren; David Litchfield formerly of Google; Dawid Golunski of Legal Hackers; Deniz Cevik of Biznet Bilisim A.S.; Dmitry Yudin of ERPScan; Emiliano J. Fausto of Onapsis; Gaston Traberg of Onapsis; Jacob Baines - Tenable Network Security (via Trend Micro's Zero Day Initiative); John Page (hyp3rlinx); Kristian Hermansen at undisclosed; Li Qiang of the Qihoo 360 Gear Team;
ma.la of LINE Corporation; Mala; Maris Elsins of Google; Matias Mevied of Onapsis; Moritz Bechler; Nicholas Lemonias of Advanced Information Security Corporation; Owais Mehtab of IS; Per Lindberg; Red Hat Product Security; Roman Shalymov of ERPScan; Shannon Hickey of Adobe; Tayeeb Rana of IS; Ubais PK of EY Global Delivery Services; Wladislaw Mitzel; Wolfgang Hotwagner; Xiejingwei Fei of FINRA;
XOR19 of Trend Micro's Zero Day Initiative; and Zuozhi Fan formerly of Alibaba.

Impact:   A remote user can obtain data on the target system.

A remote user can modify data on the target system.

A remote user can cause denial of service conditions.

A remote user can gain elevated privileges on the target system.

Solution:   Oracle has issued a fix for CVE-2016-5546, CVE-2016-5547, CVE-2016-5548, CVE-2017-3241, and CVE-2017-3252 for java-1.8.0-openjdk.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2017-0180.html

Vendor URL:  linux.oracle.com/errata/ELSA-2017-0180.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  6, 7

Message History:   This archive entry is a follow-up to the message listed below.
Jan 19 2017 Oracle Java SE Bugs Let Remote Usrs Access and Modify Data, Deny Service, and Gain Elevated Privileges



 Source Message Contents

Subject:  [El-errata] ELSA-2017-0180 Critical: Oracle Linux 6 java-1.8.0-openjdk security update

Oracle Linux Security Advisory ELSA-2017-0180

http://linux.oracle.com/errata/ELSA-2017-0180.html

The following updated rpms for Oracle Linux 6 have been uploaded to the 
Unbreakable Linux Network:

i386:
java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.i686.rpm
java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el6_8.i686.rpm
java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el6_8.i686.rpm
java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el6_8.i686.rpm
java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el6_8.i686.rpm
java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el6_8.i686.rpm
java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el6_8.i686.rpm
java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el6_8.i686.rpm
java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el6_8.noarch.rpm
java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el6_8.noarch.rpm
java-1.8.0-openjdk-src-1.8.0.121-0.b13.el6_8.i686.rpm
java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el6_8.i686.rpm

x86_64:
java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.x86_64.rpm
java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el6_8.x86_64.rpm
java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el6_8.x86_64.rpm
java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el6_8.x86_64.rpm
java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el6_8.x86_64.rpm
java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el6_8.x86_64.rpm
java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el6_8.x86_64.rpm
java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el6_8.x86_64.rpm
java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el6_8.noarch.rpm
java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el6_8.noarch.rpm
java-1.8.0-openjdk-src-1.8.0.121-0.b13.el6_8.x86_64.rpm
java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el6_8.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/java-1.8.0-openjdk-1.8.0.121-0.b13.el6_8.src.rpm



Description of changes:

[1:1.8.0.121-0.b13]
- Update to aarch64-jdk8u121-b13.
- Update PR1834/RH1022017 fix to reduce curves reported by SSL to apply 
against u121.
- Re-generate RH1393047 ObjectInputStream patch against u121.
- Resolves: rhbz#1410612

[1:1.8.0.112-0.b16]
- Update to aarch64-jdk8u112-b16.
- Drop upstreamed patches for 8044762, 8049226, 8154210, 8158260 and 
8160122.
- Re-generate size_t and key size (RH1163501) patches against u112.
- Resolves: rhbz#1410612

[1:1.8.0.111-3.b14]
- Enable a full bootstrap on JIT archs to ensure stability.
- Resolves: rhbz#1410612

[1:1.8.0.111-2.b18]
- Use java-1.7.0-openjdk to bootstrap on RHEL to allow us to use main 
build target
- Resolves: rhbz#1410612

[1:1.8.0.111-2.b18]
- Update to aarch64-jdk8u111-b18, synced with upstream u111, S8170873 
and new AArch64 fixes
- Replace our correct version of 8159244 with the amendment to the 8u 
version from 8160122.
- Resolves: rhbz#1410612


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC