SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Java SE Vendors:   Oracle, Sun
(Oracle Issues Fix for Oracle Linux) Oracle Java SE Bugs Let Remote Usrs Access and Modify Data, Deny Service, and Gain Elevated Privileges
SecurityTracker Alert ID:  1037810
SecurityTracker URL:  http://securitytracker.com/id/1037810
CVE Reference:   CVE-2016-5546, CVE-2016-5547, CVE-2016-5548, CVE-2017-3241, CVE-2017-3252   (Links to External Site)
Date:  Feb 14 2017
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6u131, 7u121, 8u112
Description:   Multiple vulnerabilities were reported in Oracle Java SE. A remote user can access data on the target system. A remote user can modify data on the target system. A remote user can cause denial of service conditions on the target system. A remote user can gain elevated privileges.

A remote user can exploit a flaw in the Hotspot component to gain elevated privileges [CVE-2017-3289].

A remote user can exploit a flaw in the Libraries component to gain elevated privileges [CVE-2017-3272].

A remote user can exploit a flaw in the RMI component to gain elevated privileges [CVE-2017-3241].

A remote user can exploit a flaw in the AWT component to gain elevated privileges [CVE-2017-3260].

A remote user can exploit a flaw in the 2D component to cause denial of service conditions [CVE-2017-3253].

A remote user can exploit a flaw in the Libraries component to modify data [CVE-2016-5546].

A remote user can exploit a flaw in the Libraries component to access data [CVE-2016-5548, CVE-2016-5549].

A remote authenticated user can exploit a flaw in the JAAS component to modify data [CVE-2017-3252].

A remote user can exploit a flaw in the Java Mission Control component to partially access data [CVE-2017-3262].

A remote user can exploit a flaw in the Libraries component to cause partial denial of service conditions [CVE-2016-5547].

A remote user can exploit a flaw in the Networking component to partially modify data [CVE-2016-5552].

A remote user can exploit a flaw in the Networking component to partially access data [CVE-2017-3231, CVE-2017-3261].

A remote user can exploit a flaw in the Deployment component to partially access data [CVE-2017-3259].

A remote user can exploit a flaw in the Java Mission Control component to partially modify data [CVE-2016-8328].

The following researchers reported these and other Oracle product vulnerabilities:

Aleksandar Nikolic of Cisco Talos; Alexander Mirosh of Hewlett Packard Enterprise; Alvaro Munoz of Hewlett Packard Enterprise; Andrew Fowler of Lithium; Behzad Najjarpour Jabbari, Secunia Research at Flexera Software; Blessen Thomas of EY Global Delivery Services; Brian Martin of Tenable Network Security;
Daniel Bleichenbacher of Google; Daniel Fahlgren; David Litchfield formerly of Google; Dawid Golunski of Legal Hackers; Deniz Cevik of Biznet Bilisim A.S.; Dmitry Yudin of ERPScan; Emiliano J. Fausto of Onapsis; Gaston Traberg of Onapsis; Jacob Baines - Tenable Network Security (via Trend Micro's Zero Day Initiative); John Page (hyp3rlinx); Kristian Hermansen at undisclosed; Li Qiang of the Qihoo 360 Gear Team;
ma.la of LINE Corporation; Mala; Maris Elsins of Google; Matias Mevied of Onapsis; Moritz Bechler; Nicholas Lemonias of Advanced Information Security Corporation; Owais Mehtab of IS; Per Lindberg; Red Hat Product Security; Roman Shalymov of ERPScan; Shannon Hickey of Adobe; Tayeeb Rana of IS; Ubais PK of EY Global Delivery Services; Wladislaw Mitzel; Wolfgang Hotwagner; Xiejingwei Fei of FINRA;
XOR19 of Trend Micro's Zero Day Initiative; and Zuozhi Fan formerly of Alibaba.

Impact:   A remote user can obtain data on the target system.

A remote user can modify data on the target system.

A remote user can cause denial of service conditions.

A remote user can gain elevated privileges on the target system.

Solution:   Oracle has issued a fix for CVE-2016-5546, CVE-2016-5547, CVE-2016-5548, CVE-2017-3241, and CVE-2017-3252 for java-1.7.0-openjdk.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2017-0269.html

Vendor URL:  linux.oracle.com/errata/ELSA-2017-0269.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  5, 6, 7

Message History:   This archive entry is a follow-up to the message listed below.
Jan 19 2017 Oracle Java SE Bugs Let Remote Usrs Access and Modify Data, Deny Service, and Gain Elevated Privileges



 Source Message Contents

Subject:  [El-errata] ELSA-2017-0269 Critical: Oracle Linux 7 java-1.7.0-openjdk security update

Oracle Linux Security Advisory ELSA-2017-0269

http://linux.oracle.com/errata/ELSA-2017-0269.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

x86_64:
java-1.7.0-openjdk-1.7.0.131-2.6.9.0.0.1.el7_3.x86_64.rpm
java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.0.1.el7_3.x86_64.rpm
java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.0.1.el7_3.x86_64.rpm
java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.0.1.el7_3.x86_64.rpm
java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.0.1.el7_3.x86_64.rpm
java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.0.1.el7_3.noarch.rpm
java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.0.1.el7_3.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/java-1.7.0-openjdk-1.7.0.131-2.6.9.0.0.1.el7_3.src.rpm



Description of changes:

[1:1.7.0.131-2.6.9.0.0.1]
- Update DISTRO_NAME in specfile

[1:1.7.0.131-2.6.9.0]
- Add blacklisted.certs to installation file list.
- Resolves: rhbz#1410612

[1:1.7.0.131-2.6.9.0]
- Bump to 2.6.9 and u131b00.
- Remove patch application debris in fsg.sh.
- Re-generate PR2809 and RH1022017 against 2.6.9.
- Update md5sum list with checksum for the new java.security file.
- Resolves: rhbz#1410612


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC