rhsa-2007_1086
Vulnerability from csaf_redhat
Published
2007-12-12 12:27
Modified
2024-11-05 16:50
Summary
Red Hat Security Advisory: java-1.4.2-bea security update
Notes
Topic
Updated java-1.4.2-bea packages that correct several security issues and
add enhancements are now available for Red Hat Enterprise Linux 4 Extras.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The BEA WebLogic JRockit 1.4.2_15 JRE and SDK contain BEA WebLogic JRockit
Virtual Machine 1.4.2_15 and are certified for the Java 2 Platform,
Standard Edition, v1.4.2.
A buffer overflow in the Java Runtime Environment image handling code was
found. If an attacker is able to cause a server application to process a
specially crafted image file, it may be possible to execute arbitrary code
as the user running the Java Virtual Machine. (CVE-2007-2788,
CVE-2007-2789, CVE-2007-3004)
A denial of service flaw was discovered in the Java Applet Viewer. An
untrusted Java applet could cause the Java Virtual Machine to become
unresponsive. Please note that the BEA WebLogic JRockit 1.4.2_15 does not
ship with a browser plug-in and therefore this issue could only be
triggered by a user running the "appletviewer" application. (CVE-2007-3005)
A denial of service flaw was found in the way the JSSE component processed
SSL/TLS handshake requests. A remote attacker able to connect to a JSSE
enabled service could send a specially crafted handshake which would cause
the Java Runtime Environment to stop responding to future requests.
(CVE-2007-3698)
A flaw was found in the way the Java Runtime Environment processes font
data. An applet viewed via the "appletviewer" application could elevate
its privileges, allowing the applet to perform actions with the same
permissions as the user running the "appletviewer" application. It may also
be possible to crash a server application which processes untrusted font
information from a third party. (CVE-2007-4381)
All users of java-1.4.2-bea should upgrade to these updated packages, which
contain the BEA WebLogic JRockit 1.4.2_15 release that resolves these
issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.4.2-bea packages that correct several security issues and\nadd enhancements are now available for Red Hat Enterprise Linux 4 Extras.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The BEA WebLogic JRockit 1.4.2_15 JRE and SDK contain BEA WebLogic JRockit\nVirtual Machine 1.4.2_15 and are certified for the Java 2 Platform,\nStandard Edition, v1.4.2. \n\nA buffer overflow in the Java Runtime Environment image handling code was\nfound. If an attacker is able to cause a server application to process a\nspecially crafted image file, it may be possible to execute arbitrary code\nas the user running the Java Virtual Machine. (CVE-2007-2788,\nCVE-2007-2789, CVE-2007-3004)\n\nA denial of service flaw was discovered in the Java Applet Viewer. An\nuntrusted Java applet could cause the Java Virtual Machine to become\nunresponsive. Please note that the BEA WebLogic JRockit 1.4.2_15 does not\nship with a browser plug-in and therefore this issue could only be\ntriggered by a user running the \"appletviewer\" application. (CVE-2007-3005) \n\nA denial of service flaw was found in the way the JSSE component processed\nSSL/TLS handshake requests. A remote attacker able to connect to a JSSE\nenabled service could send a specially crafted handshake which would cause\nthe Java Runtime Environment to stop responding to future requests.\n(CVE-2007-3698) \n\nA flaw was found in the way the Java Runtime Environment processes font\ndata. An applet viewed via the \"appletviewer\" application could elevate\nits privileges, allowing the applet to perform actions with the same\npermissions as the user running the \"appletviewer\" application. It may also\nbe possible to crash a server application which processes untrusted font\ninformation from a third party. (CVE-2007-4381)\n\nAll users of java-1.4.2-bea should upgrade to these updated packages, which\ncontain the BEA WebLogic JRockit 1.4.2_15 release that resolves these\nissues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:1086", "url": "https://access.redhat.com/errata/RHSA-2007:1086" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://dev2dev.bea.com/pub/advisory/249", "url": "http://dev2dev.bea.com/pub/advisory/249" }, { "category": "external", "summary": "http://dev2dev.bea.com/pub/advisory/248", "url": "http://dev2dev.bea.com/pub/advisory/248" }, { "category": "external", "summary": "242595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242595" }, { "category": "external", "summary": "249539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249539" }, { "category": "external", "summary": "250725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250725" }, { "category": "external", "summary": "250729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250729" }, { "category": "external", "summary": "250733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250733" }, { "category": "external", "summary": "253488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253488" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1086.json" } ], "title": "Red Hat Security Advisory: java-1.4.2-bea security update", "tracking": { "current_release_date": "2024-11-05T16:50:45+00:00", "generator": { "date": "2024-11-05T16:50:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2007:1086", "initial_release_date": "2007-12-12T12:27:00+00:00", "revision_history": [ { "date": "2007-12-12T12:27:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-12-12T07:27:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:50:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "product": { "name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "product_id": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-bea-devel@1.4.2.15-1jpp.2.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "product": { "name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "product_id": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-bea-jdbc@1.4.2.15-1jpp.2.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "product": { "name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "product_id": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-bea@1.4.2.15-1jpp.2.el4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "product": { "name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "product_id": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-bea-devel@1.4.2.15-1jpp.2.el4?arch=i686" } } }, { "category": "product_version", "name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "product": { "name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "product_id": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-bea@1.4.2.15-1jpp.2.el4?arch=i686" } } }, { "category": "product_version", "name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "product": { "name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "product_id": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-bea-jdbc@1.4.2.15-1jpp.2.el4?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686" }, "product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64" }, "product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686" }, "product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64" }, "product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686" }, "product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64" }, "product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686" }, "product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64" }, "product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686" }, "product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64" }, "product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686" }, "product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64" }, "product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686" }, "product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64" }, "product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686" }, "product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64" }, "product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686" }, "product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64" }, "product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686" }, "product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64" }, "product_reference": "java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686" }, "product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64" }, "product_reference": "java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686" }, "product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64" }, "product_reference": "java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "relates_to_product_reference": "4WS-LACD" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-2788", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2007-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "250725" } ], "notes": [ { "category": "description", "text": "Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2788" }, { "category": "external", "summary": "RHBZ#250725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2788" } ], "release_date": "2007-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-12T12:27:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1086" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit" }, { "cve": "CVE-2007-2789", "discovery_date": "2007-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "250729" } ], "notes": [ { "category": "description", "text": "The BMP image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_19 and earlier, when running on Unix/Linux systems, allows remote attackers to cause a denial of service (JVM hang) via untrusted applets or applications that open arbitrary local files via a crafted BMP file, such as /dev/tty.", "title": "Vulnerability description" }, { "category": "summary", "text": "BMP image parser vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2789" }, { "category": "external", "summary": "RHBZ#250729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250729" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2789", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2789" } ], "release_date": "2007-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-12T12:27:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1086" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "BMP image parser vulnerability" }, { "cve": "CVE-2007-3698", "discovery_date": "2007-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "249539" } ], "notes": [ { "category": "description", "text": "The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3698" }, { "category": "external", "summary": "RHBZ#249539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249539" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3698", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3698" } ], "release_date": "2007-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-12T12:27:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1086" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition" }, { "cve": "CVE-2007-4381", "discovery_date": "2007-08-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "253488" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the font parsing implementation in Sun JDK and JRE 5.0 Update 9 and earlier, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to perform unauthorized actions via an applet that grants certain privileges to itself.", "title": "Vulnerability description" }, { "category": "summary", "text": "java: Vulnerability in the font parsing code", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4381" }, { "category": "external", "summary": "RHBZ#253488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253488" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4381", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4381" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4381", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4381" } ], "release_date": "2007-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-12T12:27:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4AS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4Desktop-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4ES-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-devel-0:1.4.2.15-1jpp.2.el4.ia64", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.i686", "4WS-LACD:java-1.4.2-bea-jdbc-0:1.4.2.15-1jpp.2.el4.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1086" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "java: Vulnerability in the font parsing code" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.