Boletines de Vulnerabilidades |
Múltiples vulnerabilidades en Sun Java 5 y 6 |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Obtener acceso |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio estandar |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | Comercial Software |
Software afectado |
Sun Java JRE y JDK 5 < Update 20 Sun Java JRE y JDK 6 < Update 15 Expat |
Descripción |
|
Se han descubierto múltiples vulnerabilidades en Sun Java JRE y JDK. Las vulnerabilidades son descritas a continuación: - CVE-2009-2475: Se han descubierto múltiples vulnerabilidades de fuga de memoria en variables estaticas mutables. Un atacante remto podría ejecutar código arbitrario mediante código script especialmente diseñado. - CVE-2009-2476: La vulnerabilidad reside en un error en las comprobaciones de OpenType. Un atacante remoto podría saltar resticciones de acceso. - CVE-2009-2625: La vulnerabilidad reside en un error en Apache Xerces2. Un atacante remoto podría causar una denegación de servicio mediante una entrada XML especialmente diseñada. - CVE-2009-2670: La vulnerabilidad reside en un error en sistema de audio. Un atacante remoto podría obtener información privilegiada mediante applets o aplicaciones Java Web Start. - CVE-2009-2671: La vulnerabilidad reside en un error en la implementación SOCKS proxy. Un atacante remoto podría obtener información privilegiada mediante un applet o una aplicación Java Web Start. - CVE-2009-2672: La vulnerabilidad reside en un error en la implementación del mecanismo del proxy. Un atacante remoto podría obtener acceso no autorizado a sesiones web mediante applets o aplicaciones Java Web Start. - CVE-2009-2673: La vulnerabilidad reside en un error en la implementación del mecanismo de proxy. Un atacante remoto podría salta restricciones de acceso y conectarse a sitios web arbitrarios mediante métodos especificados. - CVE-2009-2674: Se ha descubierto una vulnerabilidad de desbordamiento de entero. Un atacante remoto podría aumentar privilegios mediante una aplicación Java Web Start e imágenes JPEG. - CVE-2009-2675: Se ha descubierto una vulnerabilidad de desbordamiento de entero. La vulnerabilidad reside en un error en la utilidad unpack2000. Un atacante remoto podría aumentar privilegios mediante un applet o una aplicación Java Web Start - CVE-2009-2676: La vulnerabilidad reside en un error en JNLPAppletlauncher. Un atacante remoto podría crear o modificar ficheros arbitrarios mediante applets de java especialmente diseñados. - CVE-2009-2689: La vulnerabilidad reside en un error en JDK13Services. Un atacante remoto podría aumentar privilegios mediante un applet o aplicación java especialmente diseñada. - CVE-2009-2690: Se ha descubierto una vulnerabilidad de fuga de información. La vulnerabilidad reside en un error en el manejo de variables. Un atacante remoto podría obtener indormación privilegiada. |
|
Solución |
|
Actualización de software Red Hat (RHSA-2009:1198-1) RHEL Desktop Supplementary (v. 5 cliente) RHEL Supplementary (v. 5 servidor) RHEL Supplementary EUS (v. 5.3.z servidor) Red Hat Enterprise Linux Extras (v. 4) Red Hat Enterprise Linux Extras (v. 4.8.z) https://rhn.redhat.com/ Red Hat (RHSA-2009:1199-1) RHEL Desktop Supplementary (v. 5 cliente) RHEL Supplementary (v. 5 servidor) RHEL Supplementary EUS (v. 5.3.z servidor) Red Hat Enterprise Linux Extras (v. 4) Red Hat Enterprise Linux Extras (v. 4.8.z) https://rhn.redhat.com/ Red Hat (RHSA-2009:1200-1) RHEL Desktop Supplementary (v. 5 cliente) RHEL Supplementary (v. 5 servidor) RHEL Supplementary EUS (v. 5.3.z servidor) Red Hat Enterprise Linux Extras (v. 4) Red Hat Enterprise Linux Extras (v. 4.8.z) https://rhn.redhat.com/ Red Hat (RHSA-2009:1201-1) Red Hat Enterprise Linux (v. 5 servidor) Red Hat Enterprise Linux Desktop (v. 5 cliente) Red Hat Enterprise Linux EUS (v. 5.3.z servidor) https://rhn.redhat.com/ Sun JDK and JRE 6 Update 15 o posterior JDK and JRE 5.0 Update 20 o posterior http://sunsolve.sun.com/pub-cgi/show.pl?target=patchpage Red Hat (RHSA-2009:1236-1) RHEL Desktop Supplementary (v. 5 cliente) RHEL Supplementary (v. 5 servidor) RHEL Supplementary EUS (v. 5.3.z servidor) Red Hat Enterprise Linux Extras (v. 4) Red Hat Enterprise Linux Extras (v. 4.8.z) https://rhn.redhat.com/ Red Hat (RHSA-2009:1505-1) RHEL Desktop Supplementary (v. 5 cliente) RHEL Supplementary (v. 5 servidor) RHEL Supplementary EUS (v. 5.4.z servidor) Red Hat Enterprise Linux Extras (v. 3) Red Hat Enterprise Linux Extras (v. 4) Red Hat Enterprise Linux Extras (v. 4.8.z) https://rhn.redhat.com/ Debian (DSA-1921-1) Debian Linux 4.0 Source http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8.orig.tar.gz http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1.diff.gz http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1.dsc alpha (DEC Alpha) http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_alpha.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_alpha.deb http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_alpha.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_alpha.udeb amd64 (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_amd64.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_amd64.udeb http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_amd64.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_amd64.deb arm (ARM) http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_arm.udeb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_arm.deb http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_arm.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_arm.deb hppa (HP PA RISC) http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_hppa.udeb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_hppa.deb http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_hppa.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_hppa.deb i386 (Intel ia32) http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_i386.udeb http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_i386.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_i386.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_i386.deb ia64 (Intel ia64) http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_ia64.deb http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_ia64.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_ia64.udeb http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_ia64.deb mips (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_mips.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_mips.deb http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_mips.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_mips.udeb mipsel (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_mipsel.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_mipsel.udeb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_mipsel.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_mipsel.deb powerpc (PowerPC) http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_powerpc.deb http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_powerpc.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_powerpc.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_powerpc.udeb s390 (IBM S/390) http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_s390.deb http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_s390.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_s390.udeb http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_s390.deb sparc (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/e/expat/libexpat1_1.95.8-3.4+etch1_sparc.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_1.95.8-3.4+etch1_sparc.deb http://security.debian.org/pool/updates/main/e/expat/expat_1.95.8-3.4+etch1_sparc.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_1.95.8-3.4+etch1_sparc.udeb Debian (DSA-1921-1) Debian Linux 5.0 Source http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1.orig.tar.gz http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1.diff.gz http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1.dsc alpha (DEC Alpha) http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_alpha.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_alpha.udeb http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_alpha.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_alpha.deb arm (ARM) http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_arm.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_arm.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_arm.udeb http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_arm.deb armel (ARM EABI) http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_armel.deb http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_armel.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_armel.udeb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_armel.deb hppa (HP PA RISC) http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_hppa.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_hppa.deb http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_hppa.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_hppa.udeb i386 (Intel ia32) http://security.debian.org/pool/updates/main/e/expat/lib64expat1_2.0.1-4+lenny1_i386.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_i386.deb http://security.debian.org/pool/updates/main/e/expat/lib64expat1-dev_2.0.1-4+lenny1_i386.deb http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_i386.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_i386.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_i386.udeb ia64 (Intel ia64) http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_ia64.udeb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_ia64.deb http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_ia64.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_ia64.deb mips (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_mips.udeb http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_mips.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_mips.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_mips.deb mipsel (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_mipsel.deb http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_mipsel.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_mipsel.udeb http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_mipsel.deb powerpc (PowerPC) http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_powerpc.deb http://security.debian.org/pool/updates/main/e/expat/lib64expat1_2.0.1-4+lenny1_powerpc.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_powerpc.udeb http://security.debian.org/pool/updates/main/e/expat/lib64expat1-dev_2.0.1-4+lenny1_powerpc.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_powerpc.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_powerpc.deb s390 (IBM S/390) http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_s390.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_s390.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_s390.udeb http://security.debian.org/pool/updates/main/e/expat/lib64expat1_2.0.1-4+lenny1_s390.deb http://security.debian.org/pool/updates/main/e/expat/lib64expat1-dev_2.0.1-4+lenny1_s390.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_s390.deb sparc (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/e/expat/libexpat1_2.0.1-4+lenny1_sparc.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-dev_2.0.1-4+lenny1_sparc.deb http://security.debian.org/pool/updates/main/e/expat/lib64expat1-dev_2.0.1-4+lenny1_sparc.deb http://security.debian.org/pool/updates/main/e/expat/expat_2.0.1-4+lenny1_sparc.deb http://security.debian.org/pool/updates/main/e/expat/lib64expat1_2.0.1-4+lenny1_sparc.deb http://security.debian.org/pool/updates/main/e/expat/libexpat1-udeb_2.0.1-4+lenny1_sparc.udeb Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux. Red Hat (RHSA-2009:1551-1) Red Hat Enterprise Linux for SAP https://rhn.redhat.com/ Hewlett-Packard Java v6.0.04 / Java v6.0.05 Java v5.0.16 / Java v5.0.17 Java v1.4.2.22 / Java v1.4.2.23 http://www.itrc.hp.com/service/patch/mainPage.do Red Hat (RHSA-2009:1586-1) RHEL Desktop Supplementary (v. 5 cliente) RHEL Supplementary (v. 5 servidor) RHEL Supplementary EUS (v. 5.4.z servidor) Red Hat Enterprise Linux Extras (v. 4) Red Hat Enterprise Linux Extras (v. 4.8.z) https://rhn.redhat.com/ Sun (268228) Sun GlassFish Enterprise Server v2.1 / HADB - Package Based / patch 128640-13 o posterior (con soporte) o 141709-02 o posterior (sin soporte) Sun GlassFish Enterprise Server v2.1 / HADB / patch 128643-13 o posterior (con soporte) o 141700-02 o posterior (sin soporte) Sun Java System Application Server 8.1 / patch 119166-39 o posterior (Enterprise Edition package based) o 119169-32 o posterior (Enterprise Edition file based) Sun Java System Application Server 8.2 / patch 124672-13 o posterior (Enterprise Edition package based) o 124675-12 o posterior (Enterprise Edition file based) Sun GlassFish Enterprise Server v2.1 / HADB - Package Based / patch 128641-13 o posterior (con soporte) o 141710-02 o posterior (sin soporte) Sun GlassFish Enterprise Server v2.1 / HADB / patch 128644-13 o posterior (con soporte) o 141701-02 o posterior (sin soporte) Sun Java System Application Server 8.1 / patch 119167-39 o posterior (Enterprise Edition package based) o 119170-32 o posterior (Enterprise Edition file based) Sun Java System Application Server 8.2 / patch 124673-13 o posterior (Enterprise Edition package based) o 124676-12 o posterior (Enterprise Edition file based) Sun GlassFish Enterprise Server v2.1 / HADB - Package Based / patch 128642-13 o posterior (con soporte) o 141711-02 o posterior (sin soporte) Sun GlassFish Enterprise Server v2.1 / HADB / patch 128645-13 o posterior (con soporte) o 141702-02 o posterior (sin soporte) Sun Java System Application Server 8.1 / patch 119168-39 o posterior (Enterprise Edition package based) o 119171-32 o posterior (Enterprise Edition file based) Sun Java System Application Server 8.2 / patch 124674-13 o posterior (Enterprise Edition package based) o 124677-12 o posterior (Enterprise Edition file based) Sun GlassFish Enterprise Server v2.1 / HADB / patch 128646-13 o posterior (con soporte) o 141703-02 o posterior (sin soporte) Sun Java System Application Server 8.1 / patch 122848-24 o posterior (Enterprise Edition package based) o 119172-32 o posterior (Enterprise Edition file based) Sun Java System Application Server 8.2 / patch 124684-14 o posterior (Enterprise Edition package based) o 124678-12 o posterior (Enterprise Edition file based) http://sunsolve.sun.com/pub-cgi/show.pl?target=patchpage Debian (DSA-1984-1) Debian Linux 4.0 Source http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.8.1-1+etch1.dsc http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.8.1.orig.tar.gz http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.8.1-1+etch1.diff.gz Arquitectura independiente: http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.8.1-1+etch1_all.deb Debian (DSA-1984-1) Debian Linux 5.0 Source http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.9.1.orig.tar.gz http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.9.1-2+lenny1.dsc http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.9.1-2+lenny1.diff.gz Arquitectura independiente: http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.9.1-2+lenny1_all.deb http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-doc_2.9.1-2+lenny1_all.deb amd64 (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_amd64.deb armel (ARM EABI) http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_armel.deb i386 (Intel ia32) http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_i386.deb ia64 (Intel ia64) http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_ia64.deb mips (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_mips.deb mipsel (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_mipsel.deb powerpc (PowerPC) http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_powerpc.deb s390 (IBM S/390) http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_s390.deb sparc (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_sparc.deb Red Hat (RHSA-2011:0858-1) Red Hat Enterprise Linux Desktop Optional (v. 6) Red Hat Enterprise Linux HPC Node Optional (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server Optional (v. 6) Red Hat Enterprise Linux Workstation (v. 6) Red Hat Enterprise Linux Workstation Optional (v. 6) https://rhn.redhat.com/ |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE |
CVE-2009-2475 CVE-2009-2476 CVE-2009-2625 CVE-2009-2670 CVE-2009-2671 CVE-2009-2672 CVE-2009-2673 CVE-2009-2674 CVE-2009-2675 CVE-2009-2676 CVE-2009-2689 CVE-2009-2690 |
BID | |
Recursos adicionales |
|
Red Hat Security Advisory (RHSA-2009:1198-1) https://rhn.redhat.com/errata/RHSA-2009-1198.html Red Hat Security Advisory (RHSA-2009:1199-1) https://rhn.redhat.com/errata/RHSA-2009-1199.html Red Hat Security Advisory (RHSA-2009:1200-1) https://rhn.redhat.com/errata/RHSA-2009-1200.html Red Hat Security Advisory (RHSA-2009:1201-1) https://rhn.redhat.com/errata/RHSA-2009-1201.html Sun Alert Notification (263409) http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1 Sun Alert Notification (263408) http://sunsolve.sun.com/search/document.do?assetkey=1-66-263408-1 Sun Alert Notification (263489) http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1 SUSE Security Advisory (SUSE-SA:2009:043) http://www.novell.com/linux/security/advisories/2009_43_sunjava.html Red Hat Security Advisory (RHSA-2009:1236-1) https://rhn.redhat.com/errata/RHSA-2009-1236.html SUSE Security Advisory (SUSE-SR:2009:016) http://www.novell.com/linux/security/advisories/2009_16_sr.html Red Hat Security Advisory (RHSA-2009:1505-1) https://rhn.redhat.com/errata/RHSA-2009-1505.html SUSE Security Advisory (SUSE-SA:2009:048) http://www.novell.com/linux/security/advisories/2009_48_firefox.html SUSE Security Advisory (SUSE-SR:2009:017) http://www.novell.com/linux/security/advisories/2009_17_sr.html Debian Security Advisory (DSA-1921-1) http://lists.debian.org/debian-security-announce/2009/msg00244.html SUSE Security Advisory (SUSE-SA:2009:053) http://www.novell.com/linux/security/advisories/2009_53_ibmjava.html Red Hat Security Advisory (RHSA-2009:1551-1) https://rhn.redhat.com/errata/RHSA-2009-1551.html HP SECURITY BULLETIN (HPSBUX02476) https://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01925304-1 Red Hat Security Advisory (RHSA-2009:1582-1) https://rhn.redhat.com/errata/RHSA-2009-1582.html Red Hat Security Advisory (RHSA-2009:1615-1) https://rhn.redhat.com/errata/RHSA-2009-1615.html Sun Alert Notification (272209) http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1 Debian Security Advisory (DSA-1984-1) http://lists.debian.org/debian-security-announce/2010/msg00021.html SUSE Security Advisory (SUSE-SR:2010:015) http://www.novell.com/linux/security/advisories/2010_15_sr.html Red Hat Security Advisory (RHSA-2011:0858-1) https://rhn.redhat.com/errata/RHSA-2011-0858.html |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2009-08-10 |
1.1 | Aviso emitido por Red Hat (RHSA-2009:1236-1) | 2009-08-28 |
1.2 | Aviso emitido por Suse (SUSE-SR:2009:016) | 2009-10-13 |
1.3 | Aviso emitido por Red Hat (RHSA-2009:1505-1) | 2009-10-19 |
1.4 | Aviso emitido por Suse (SUSE-SA:2009:04) | 2009-10-27 |
1.5 | Aviso emitido por Suse (SUSE-SR:2009:017) | 2009-11-03 |
1.6 | Aviso emitido por Debian (DSA-1921-1), aviso emitido por Suse (SUSE-SA:2009:053) | 2009-11-10 |
1.7 | Aviso emitido por Red Hat (RHSA-2009:1551-1) | 2009-11-12 |
1.8 | Aviso emitido por HP (HPSBUX02476) | 2009-11-13 |
1.9 | Aviso emitido por Red Hat (RHSA-2009:1582-1) | 2009-11-17 |
1.10 | Aviso emitido por Red Hat (RHSA-2009:1615-1) | 2009-12-17 |
1.11 | Aviso emitido por Sun (272209) | 2009-12-21 |
1.12 | Aviso emitido por Debian (DSA-1984-1) | 2010-02-01 |
1.13 | Aviso emitido por Suse (SUSE-SA:2010:005) | 2010-03-04 |
1.14 | Aviso emitido por Suse (SUSE-SR:2010:015) | 2010-09-03 |
1.15 | Aviso actualizado por Red Hat (RHSA-2011:0858-1) | 2011-06-13 |