int(4796)

Boletines de Vulnerabilidades


Múltiples vulnerabilidades en Sun Java 5 y 6

Clasificación de la vulnerabilidad

Propiedad Valor
Nivel de Confianza Oficial
Impacto Obtener acceso
Dificultad Experto
Requerimientos del atacante Acceso remoto sin cuenta a un servicio estandar

Información sobre el sistema

Propiedad Valor
Fabricante afectado Comercial Software
Software afectado Sun Java JRE y JDK 5 < Update 20
Sun Java JRE y JDK 6 < Update 15
Expat

Descripción

Se han descubierto múltiples vulnerabilidades en Sun Java JRE y JDK. Las vulnerabilidades son descritas a continuación:

- CVE-2009-2475: Se han descubierto múltiples vulnerabilidades de fuga de memoria en variables estaticas mutables. Un atacante remto podría ejecutar código arbitrario mediante código script especialmente diseñado.

- CVE-2009-2476: La vulnerabilidad reside en un error en las comprobaciones de OpenType. Un atacante remoto podría saltar resticciones de acceso.

- CVE-2009-2625: La vulnerabilidad reside en un error en Apache Xerces2. Un atacante remoto podría causar una denegación de servicio mediante una entrada XML especialmente diseñada.

- CVE-2009-2670: La vulnerabilidad reside en un error en sistema de audio. Un atacante remoto podría obtener información privilegiada mediante applets o aplicaciones Java Web Start.

- CVE-2009-2671: La vulnerabilidad reside en un error en la implementación SOCKS proxy. Un atacante remoto podría obtener información privilegiada mediante un applet o una aplicación Java Web Start.

- CVE-2009-2672: La vulnerabilidad reside en un error en la implementación del mecanismo del proxy. Un atacante remoto podría obtener acceso no autorizado a sesiones web mediante applets o aplicaciones Java Web Start.

- CVE-2009-2673: La vulnerabilidad reside en un error en la implementación del mecanismo de proxy. Un atacante remoto podría salta restricciones de acceso y conectarse a sitios web arbitrarios mediante métodos especificados.

- CVE-2009-2674: Se ha descubierto una vulnerabilidad de desbordamiento de entero. Un atacante remoto podría aumentar privilegios mediante una aplicación Java Web Start e imágenes JPEG.

- CVE-2009-2675: Se ha descubierto una vulnerabilidad de desbordamiento de entero. La vulnerabilidad reside en un error en la utilidad unpack2000. Un atacante remoto podría aumentar privilegios mediante un applet o una aplicación Java Web Start

- CVE-2009-2676: La vulnerabilidad reside en un error en JNLPAppletlauncher. Un atacante remoto podría crear o modificar ficheros arbitrarios mediante applets de java especialmente diseñados.

- CVE-2009-2689: La vulnerabilidad reside en un error en JDK13Services. Un atacante remoto podría aumentar privilegios mediante un applet o aplicación java especialmente diseñada.

- CVE-2009-2690: Se ha descubierto una vulnerabilidad de fuga de información. La vulnerabilidad reside en un error en el manejo de variables. Un atacante remoto podría obtener indormación privilegiada.

Solución



Actualización de software

Red Hat (RHSA-2009:1198-1)
RHEL Desktop Supplementary (v. 5 cliente)
RHEL Supplementary (v. 5 servidor)
RHEL Supplementary EUS (v. 5.3.z servidor)
Red Hat Enterprise Linux Extras (v. 4)
Red Hat Enterprise Linux Extras (v. 4.8.z)
https://rhn.redhat.com/

Red Hat (RHSA-2009:1199-1)
RHEL Desktop Supplementary (v. 5 cliente)
RHEL Supplementary (v. 5 servidor)
RHEL Supplementary EUS (v. 5.3.z servidor)
Red Hat Enterprise Linux Extras (v. 4)
Red Hat Enterprise Linux Extras (v. 4.8.z)
https://rhn.redhat.com/

Red Hat (RHSA-2009:1200-1)
RHEL Desktop Supplementary (v. 5 cliente)
RHEL Supplementary (v. 5 servidor)
RHEL Supplementary EUS (v. 5.3.z servidor)
Red Hat Enterprise Linux Extras (v. 4)
Red Hat Enterprise Linux Extras (v. 4.8.z)
https://rhn.redhat.com/

Red Hat (RHSA-2009:1201-1)
Red Hat Enterprise Linux (v. 5 servidor)
Red Hat Enterprise Linux Desktop (v. 5 cliente)
Red Hat Enterprise Linux EUS (v. 5.3.z servidor)
https://rhn.redhat.com/

Sun
JDK and JRE 6 Update 15 o posterior
JDK and JRE 5.0 Update 20 o posterior
http://sunsolve.sun.com/pub-cgi/show.pl?target=patchpage

Red Hat (RHSA-2009:1236-1)
RHEL Desktop Supplementary (v. 5 cliente)
RHEL Supplementary (v. 5 servidor)
RHEL Supplementary EUS (v. 5.3.z servidor)
Red Hat Enterprise Linux Extras (v. 4)
Red Hat Enterprise Linux Extras (v. 4.8.z)
https://rhn.redhat.com/

Red Hat (RHSA-2009:1505-1)
RHEL Desktop Supplementary (v. 5 cliente)
RHEL Supplementary (v. 5 servidor)
RHEL Supplementary EUS (v. 5.4.z servidor)
Red Hat Enterprise Linux Extras (v. 3)
Red Hat Enterprise Linux Extras (v. 4)
Red Hat Enterprise Linux Extras (v. 4.8.z)
https://rhn.redhat.com/

Debian (DSA-1921-1)

Debian Linux 4.0
Source
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8.orig.tar.gz
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1.diff.gz
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1.dsc
alpha (DEC Alpha)
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_alpha.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_alpha.deb
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_alpha.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_alpha.udeb
amd64 (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_amd64.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_amd64.udeb
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_amd64.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_amd64.deb
arm (ARM)
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_arm.udeb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_arm.deb
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_arm.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_arm.deb
hppa (HP PA RISC)
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_hppa.udeb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_hppa.deb
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_hppa.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_hppa.deb
i386 (Intel ia32)
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_i386.udeb
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_i386.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_i386.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_i386.deb
ia64 (Intel ia64)
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_ia64.deb
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_ia64.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_ia64.udeb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_ia64.deb
mips (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_mips.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_mips.deb
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_mips.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_mips.udeb
mipsel (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_mipsel.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_mipsel.udeb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_mipsel.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_mipsel.deb
powerpc (PowerPC)
http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_powerpc.deb
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_powerpc.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_powerpc.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_powerpc.udeb
s390 (IBM S/390)
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_s390.deb
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_s390.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_s390.udeb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_s390.deb
sparc (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_sparc.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_sparc.deb
http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_sparc.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_sparc.udeb

Debian (DSA-1921-1)

Debian Linux 5.0
Source
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1.orig.tar.gz
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1.diff.gz
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1.dsc
alpha (DEC Alpha)
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_alpha.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_alpha.udeb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_alpha.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_alpha.deb
arm (ARM)
http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_arm.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_arm.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_arm.udeb
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_arm.deb
armel (ARM EABI)
http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_armel.deb
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_armel.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_armel.udeb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_armel.deb
hppa (HP PA RISC)
http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_hppa.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_hppa.deb
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_hppa.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_hppa.udeb
i386 (Intel ia32)
http://security.debian.org/pool/updates/main/e/expat/lib64expat1_2.0.1-4+lenny1_i386.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_i386.deb
http://security.debian.org/pool/updates/main/e/expat/lib64expat1-dev_2.0.1-4+lenny1_i386.deb
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_i386.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_i386.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_i386.udeb
ia64 (Intel ia64)
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_ia64.udeb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_ia64.deb
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_ia64.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_ia64.deb
mips (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_mips.udeb
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_mips.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_mips.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_mips.deb
mipsel (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_mipsel.deb
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_mipsel.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_mipsel.udeb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_mipsel.deb
powerpc (PowerPC)
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_powerpc.deb
http://security.debian.org/pool/updates/main/e/expat/lib64expat1_2.0.1-4+lenny1_powerpc.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_powerpc.udeb
http://security.debian.org/pool/updates/main/e/expat/lib64expat1-dev_2.0.1-4+lenny1_powerpc.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_powerpc.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_powerpc.deb
s390 (IBM S/390)
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_s390.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_s390.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_s390.udeb
http://security.debian.org/pool/updates/main/e/expat/lib64expat1_2.0.1-4+lenny1_s390.deb
http://security.debian.org/pool/updates/main/e/expat/lib64expat1-dev_2.0.1-4+lenny1_s390.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_s390.deb
sparc (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_sparc.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_sparc.deb
http://security.debian.org/pool/updates/main/e/expat/lib64expat1-dev_2.0.1-4+lenny1_sparc.deb
http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_sparc.deb
http://security.debian.org/pool/updates/main/e/expat/lib64expat1_2.0.1-4+lenny1_sparc.deb
http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_sparc.udeb

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux.

Red Hat (RHSA-2009:1551-1)
Red Hat Enterprise Linux for SAP
https://rhn.redhat.com/

Hewlett-Packard
Java v6.0.04 / Java v6.0.05
Java v5.0.16 / Java v5.0.17
Java v1.4.2.22 / Java v1.4.2.23
http://www.itrc.hp.com/service/patch/mainPage.do

Red Hat (RHSA-2009:1586-1)
RHEL Desktop Supplementary (v. 5 cliente)
RHEL Supplementary (v. 5 servidor)
RHEL Supplementary EUS (v. 5.4.z servidor)
Red Hat Enterprise Linux Extras (v. 4)
Red Hat Enterprise Linux Extras (v. 4.8.z)
https://rhn.redhat.com/

Sun (268228)
Sun GlassFish Enterprise Server v2.1 / HADB - Package Based / patch 128640-13 o posterior (con soporte) o 141709-02 o posterior (sin soporte)
Sun GlassFish Enterprise Server v2.1 / HADB / patch 128643-13 o posterior (con soporte) o 141700-02 o posterior (sin soporte)
Sun Java System Application Server 8.1 / patch 119166-39 o posterior (Enterprise Edition package based) o 119169-32 o posterior (Enterprise Edition file based)
Sun Java System Application Server 8.2 / patch 124672-13 o posterior (Enterprise Edition package based) o 124675-12 o posterior (Enterprise Edition file based)
Sun GlassFish Enterprise Server v2.1 / HADB - Package Based / patch 128641-13 o posterior (con soporte) o 141710-02 o posterior (sin soporte)
Sun GlassFish Enterprise Server v2.1 / HADB / patch 128644-13 o posterior (con soporte) o 141701-02 o posterior (sin soporte)
Sun Java System Application Server 8.1 / patch 119167-39 o posterior (Enterprise Edition package based) o 119170-32 o posterior (Enterprise Edition file based)
Sun Java System Application Server 8.2 / patch 124673-13 o posterior (Enterprise Edition package based) o 124676-12 o posterior (Enterprise Edition file based)
Sun GlassFish Enterprise Server v2.1 / HADB - Package Based / patch 128642-13 o posterior (con soporte) o 141711-02 o posterior (sin soporte)
Sun GlassFish Enterprise Server v2.1 / HADB / patch 128645-13 o posterior (con soporte) o 141702-02 o posterior (sin soporte)
Sun Java System Application Server 8.1 / patch 119168-39 o posterior (Enterprise Edition package based) o 119171-32 o posterior (Enterprise Edition file based)
Sun Java System Application Server 8.2 / patch 124674-13 o posterior (Enterprise Edition package based) o 124677-12 o posterior (Enterprise Edition file based)
Sun GlassFish Enterprise Server v2.1 / HADB / patch 128646-13 o posterior (con soporte) o 141703-02 o posterior (sin soporte)
Sun Java System Application Server 8.1 / patch 122848-24 o posterior (Enterprise Edition package based) o 119172-32 o posterior (Enterprise Edition file based)
Sun Java System Application Server 8.2 / patch 124684-14 o posterior (Enterprise Edition package based) o 124678-12 o posterior (Enterprise Edition file based)
http://sunsolve.sun.com/pub-cgi/show.pl?target=patchpage

Debian (DSA-1984-1)

Debian Linux 4.0
Source
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.8.1-1+etch1.dsc
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.8.1.orig.tar.gz
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.8.1-1+etch1.diff.gz
Arquitectura independiente:
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.8.1-1+etch1_all.deb

Debian (DSA-1984-1)

Debian Linux 5.0
Source
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.9.1.orig.tar.gz
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.9.1-2+lenny1.dsc
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.9.1-2+lenny1.diff.gz
Arquitectura independiente:
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.9.1-2+lenny1_all.deb
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-doc_2.9.1-2+lenny1_all.deb
amd64 (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_amd64.deb
armel (ARM EABI)
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_armel.deb
i386 (Intel ia32)
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_i386.deb
ia64 (Intel ia64)
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_ia64.deb
mips (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_mips.deb
mipsel (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_mipsel.deb
powerpc (PowerPC)
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_powerpc.deb
s390 (IBM S/390)
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_s390.deb
sparc (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_sparc.deb

Red Hat (RHSA-2011:0858-1)
Red Hat Enterprise Linux Desktop Optional (v. 6)
Red Hat Enterprise Linux HPC Node Optional (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server Optional (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)
Red Hat Enterprise Linux Workstation Optional (v. 6)
https://rhn.redhat.com/

Identificadores estándar

Propiedad Valor
CVE CVE-2009-2475
CVE-2009-2476
CVE-2009-2625
CVE-2009-2670
CVE-2009-2671
CVE-2009-2672
CVE-2009-2673
CVE-2009-2674
CVE-2009-2675
CVE-2009-2676
CVE-2009-2689
CVE-2009-2690
BID

Recursos adicionales

Red Hat Security Advisory (RHSA-2009:1198-1)
https://rhn.redhat.com/errata/RHSA-2009-1198.html

Red Hat Security Advisory (RHSA-2009:1199-1)
https://rhn.redhat.com/errata/RHSA-2009-1199.html

Red Hat Security Advisory (RHSA-2009:1200-1)
https://rhn.redhat.com/errata/RHSA-2009-1200.html

Red Hat Security Advisory (RHSA-2009:1201-1)
https://rhn.redhat.com/errata/RHSA-2009-1201.html

Sun Alert Notification (263409)
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1

Sun Alert Notification (263408)
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263408-1

Sun Alert Notification (263489)
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1

SUSE Security Advisory (SUSE-SA:2009:043)
http://www.novell.com/linux/security/advisories/2009_43_sunjava.html

Red Hat Security Advisory (RHSA-2009:1236-1)
https://rhn.redhat.com/errata/RHSA-2009-1236.html

SUSE Security Advisory (SUSE-SR:2009:016)
http://www.novell.com/linux/security/advisories/2009_16_sr.html

Red Hat Security Advisory (RHSA-2009:1505-1)
https://rhn.redhat.com/errata/RHSA-2009-1505.html

SUSE Security Advisory (SUSE-SA:2009:048)
http://www.novell.com/linux/security/advisories/2009_48_firefox.html

SUSE Security Advisory (SUSE-SR:2009:017)
http://www.novell.com/linux/security/advisories/2009_17_sr.html

Debian Security Advisory (DSA-1921-1)
http://lists.debian.org/debian-security-announce/2009/msg00244.html

SUSE Security Advisory (SUSE-SA:2009:053)
http://www.novell.com/linux/security/advisories/2009_53_ibmjava.html

Red Hat Security Advisory (RHSA-2009:1551-1)
https://rhn.redhat.com/errata/RHSA-2009-1551.html

HP SECURITY BULLETIN (HPSBUX02476)
https://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01925304-1

Red Hat Security Advisory (RHSA-2009:1582-1)
https://rhn.redhat.com/errata/RHSA-2009-1582.html

Red Hat Security Advisory (RHSA-2009:1615-1)
https://rhn.redhat.com/errata/RHSA-2009-1615.html

Sun Alert Notification (272209)
http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1

Debian Security Advisory (DSA-1984-1)
http://lists.debian.org/debian-security-announce/2010/msg00021.html

SUSE Security Advisory (SUSE-SR:2010:015)
http://www.novell.com/linux/security/advisories/2010_15_sr.html

Red Hat Security Advisory (RHSA-2011:0858-1)
https://rhn.redhat.com/errata/RHSA-2011-0858.html

Histórico de versiones

Versión Comentario Fecha
1.0 Aviso emitido 2009-08-10
1.1 Aviso emitido por Red Hat (RHSA-2009:1236-1) 2009-08-28
1.2 Aviso emitido por Suse (SUSE-SR:2009:016) 2009-10-13
1.3 Aviso emitido por Red Hat (RHSA-2009:1505-1) 2009-10-19
1.4 Aviso emitido por Suse (SUSE-SA:2009:04) 2009-10-27
1.5 Aviso emitido por Suse (SUSE-SR:2009:017) 2009-11-03
1.6 Aviso emitido por Debian (DSA-1921-1), aviso emitido por Suse (SUSE-SA:2009:053) 2009-11-10
1.7 Aviso emitido por Red Hat (RHSA-2009:1551-1) 2009-11-12
1.8 Aviso emitido por HP (HPSBUX02476) 2009-11-13
1.9 Aviso emitido por Red Hat (RHSA-2009:1582-1) 2009-11-17
1.10 Aviso emitido por Red Hat (RHSA-2009:1615-1) 2009-12-17
1.11 Aviso emitido por Sun (272209) 2009-12-21
1.12 Aviso emitido por Debian (DSA-1984-1) 2010-02-01
1.13 Aviso emitido por Suse (SUSE-SA:2010:005) 2010-03-04
1.14 Aviso emitido por Suse (SUSE-SR:2010:015) 2010-09-03
1.15 Aviso actualizado por Red Hat (RHSA-2011:0858-1) 2011-06-13

Miembros de

Ministerio de Defensa
CNI
CCN
CCN-CERT