Skip to navigation

Security Advisory Critical: java-1.5.0-sun security update

Advisory: RHSA-2007:0818-2
Type: Security Advisory
Severity: Critical
Issued on: 2007-08-06
Last updated on: 2007-08-06
Affected Products: Red Hat Enterprise Linux Extras (v. 4)
CVEs ( CVE-2007-3503


Updated java-1.5.0-sun packages that correct several security issues are
available for Red Hat Enterprise Linux 4 Extras.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

The Java Runtime Environment (JRE) contains the software and tools
that users need to run applets and applications written using the Java
programming language.

The Javadoc tool was able to generate HTML documentation pages that
contained cross-site scripting (XSS) vulnerabilities. A remote attacker
could use this to inject arbitrary web script or HTML. (CVE-2007-3503)

The Java Web Start URL parsing component contained a buffer overflow
vulnerability within the parsing code for JNLP files. A remote attacker
could create a malicious JNLP file that could trigger this flaw and execute
arbitrary code when opened. (CVE-2007-3655)

The JSSE component did not correctly process SSL/TLS handshake requests. A
remote attacker who is able to connect to a JSSE-based service could
trigger this flaw leading to a denial-of-service. (CVE-2007-3698)

A flaw was found in the applet class loader. An untrusted applet could use
this flaw to circumvent network access restrictions, possibly connecting to
services hosted on the machine that executed the applet. (CVE-2007-3922)

All users of java-sun-1.5.0 should upgrade to these packages, which contain
Sun Java 1.5.0 Update 12 that corrects these issues.


Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at

Updated packages

Red Hat Enterprise Linux Extras (v. 4)

File outdated by:  RHSA-2009:1571
    MD5: 5288f89064913e18146ab506c59b9f21
File outdated by:  RHSA-2009:1571
    MD5: f5348203e78aa64ad19435b0648feaac
File outdated by:  RHSA-2009:1571
    MD5: 83ce83af56148830f7f180c3a130b2ff
File outdated by:  RHSA-2009:1571
    MD5: 5e35a59d97f96e946e6041029dc2c18e
File outdated by:  RHSA-2009:1571
    MD5: e8523c770f5d5e132f805a412de1e4d4
File outdated by:  RHSA-2009:1571
    MD5: 47475bcd46e37bad046fa7eb26e75c83
File outdated by:  RHSA-2009:1571
    MD5: c75ff10faf480c14455e17d19429e762
File outdated by:  RHSA-2009:1571
    MD5: ee527a32217fb56fce9c52080959cd2a
File outdated by:  RHSA-2009:1571
    MD5: 294fbe07c37991b3757e30926b1b9c46
File outdated by:  RHSA-2009:1571
    MD5: 8280e5a0c39c55fd8c4cedf1ad0f8b23
File outdated by:  RHSA-2009:1571
    MD5: 60247d67a91aac8d1bc998c4a076bfab
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

246765 - CVE-2007-3503 HTML files generated with Javadoc are vulnerable to a XSS
248864 - CVE-2007-3655 A buffer overflow vulnerability in Java Web Start URL parsing code
249533 - CVE-2007-3922 Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions
249539 - CVE-2007-3698 Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at