Lucene search

K
redhatRedHatRHSA-2007:0072
HistoryFeb 08, 2007 - 12:00 a.m.

(RHSA-2007:0072) Critical: IBMJava2 security update

2007-02-0800:00:00
access.redhat.com
18

0.388 Low

EPSS

Percentile

97.3%

IBM’s 1.3.1 Java release includes the IBM Java 2 Runtime Environment
and the IBM Java 2 Software Development Kit.

Vulnerabilities were discovered in the Java Runtime Environment. An
untrusted applet could use these vulnerabilities to access data from other
applets. (CVE-2006-6736, CVE-2006-6737)

Buffer overflow vulnerabilities were discovered in the Java Runtime
Environment. An untrusted applet could use these flaws to elevate its
privileges, possibly reading and writing local files or executing local
applications. (CVE-2006-6731)

Daniel Bleichenbacher discovered an attack on PKCS #1 v1.5 signatures.
Where an RSA key with exponent 3 is used it may be possible for an attacker
to forge a PKCS #1 v1.5 signature that would be incorrectly verified by
implementations that do not check for excess data in the RSA exponentiation
result of the signature. (CVE-2006-4339)

All users of IBMJava2 should upgrade to these updated packages, which
contain IBM’s 1.3.1 SR10a Java release which resolves these issues.

Please note that the packages in this erratum are the same as those we
released on January 24th 2007 with advisories RHBA-2007:0023 and
RHEA-2007:0024. We have issued this security update as these previous
advisories did not specify that they fixed critical security issues. If
you have already updated to those versions of IBMJava you will not need to
apply this update.