The IBM 1.4.2 SR13-FP4 Java release includes the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit.
A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure
Sockets Layer) protocols handle session renegotiation. A man-in-the-middle
attacker could use this flaw to prefix arbitrary plain text to a client’s
session (for example, an HTTPS connection to a website). This could force
the server to process an attacker’s request as if authenticated using the
victim’s credentials. (CVE-2009-3555)
This update disables renegotiation in the non-default IBM JSSE2 provider
for the Java Secure Socket Extension (JSSE) component. The default JSSE
provider is not updated with this fix. Refer to the IBMJSSE2 Provider
Reference Guide, linked to in the References, for instructions on how to
configure the IBM Java 2 Runtime Environment to use the JSSE2 provider by
default.
When using the JSSE2 provider, unsafe renegotiation can be re-enabled using
the com.ibm.jsse2.renegotiate property. Refer to the following
Knowledgebase article for details:
http://kbase.redhat.com/faq/docs/DOC-20491
This update also fixes the following bug:
All users of java-1.4.2-ibm are advised to upgrade to these updated
packages, which contain the IBM 1.4.2 SR13-FP4 Java release. All running
instances of IBM Java must be restarted for this update to take effect.