Vulnerabilities > CVE-2017-5645 - Deserialization of Untrusted Data vulnerability in multiple products

047910
CVSS 9.8 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
apache
netapp
redhat
oracle
CWE-502
critical
nessus

Summary

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

Vulnerable Configurations

Part Description Count
Application
Apache
59
Application
Netapp
6
Application
Redhat
1
Application
Oracle
235
OS
Redhat
17

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2808.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 7.0 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.0.8 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.7, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645) * A vulnerability was found in Jasypt that would allow an attacker to perform a timing attack on password hash comparison. (CVE-2014-9970) * It was found that an information disclosure flaw in Bouncy Castle could enable a local malicious application to gain access to user
    last seen2020-06-01
    modified2020-06-02
    plugin id103526
    published2017-09-28
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103526
    titleRHEL 7 : JBoss EAP (RHSA-2017:2808)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2017:2808. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(103526);
      script_version("3.9");
      script_cvs_date("Date: 2019/10/24 15:35:43");
    
      script_cve_id("CVE-2014-9970", "CVE-2015-6644", "CVE-2017-2582", "CVE-2017-5645", "CVE-2017-7536");
      script_xref(name:"RHSA", value:"2017:2808");
    
      script_name(english:"RHEL 7 : JBoss EAP (RHSA-2017:2808)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update is now available for Red Hat JBoss Enterprise Application
    Platform 7.0 for Red Hat Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having a security
    impact of Important. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Red Hat JBoss Enterprise Application Platform is a platform for Java
    applications based on the JBoss Application Server.
    
    This release of Red Hat JBoss Enterprise Application Platform 7.0.8
    serves as a replacement for Red Hat JBoss Enterprise Application
    Platform 7.0.7, and includes bug fixes and enhancements, which are
    documented in the Release Notes document linked to in the References.
    
    Security Fix(es) :
    
    * It was found that when using remote logging with log4j socket server
    the log4j server would deserialize any log event received via TCP or
    UDP. An attacker could use this flaw to send a specially crafted log
    event that, during deserialization, would execute arbitrary code in
    the context of the logger application. (CVE-2017-5645)
    
    * A vulnerability was found in Jasypt that would allow an attacker to
    perform a timing attack on password hash comparison. (CVE-2014-9970)
    
    * It was found that an information disclosure flaw in Bouncy Castle
    could enable a local malicious application to gain access to user's
    private information. (CVE-2015-6644)
    
    * It was found that while parsing the SAML messages the StaxParserUtil
    class of Picketlink replaces special strings for obtaining attribute
    values with system property. This could allow an attacker to determine
    values of system properties at the attacked system by formatting the
    SAML request ID field to be the chosen system property which could be
    obtained in the 'InResponseTo' field in the response. (CVE-2017-2582)
    
    * It was found that when the security manager's reflective
    permissions, which allows it to access the private members of the
    class, are granted to Hibernate Validator, a potential privilege
    escalation can occur. By allowing the calling code to access those
    private members without the permission an attacker may be able to
    validate an invalid instance and access the private member value via
    ConstraintViolation#getInvalidValue(). (CVE-2017-7536)
    
    The CVE-2017-2582 issue was discovered by Hynek Mlnarik (Red Hat) and
    the CVE-2017-7536 issue was discovered by Gunnar Morling (Red Hat)."
      );
      # https://access.redhat.com/documentation/en/
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/documentation/en-us/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2017:2808"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-9970"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-6644"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-2582"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-5645"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-7536"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-artemis-native");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-artemis-native-wildfly");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-bouncycastle");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-bouncycastle-mail");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-bouncycastle-pkix");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-bouncycastle-prov");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-validator");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-validator-cdi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jasypt");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jboss-jms-api_2.0_spec");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jboss-logmanager");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jboss-metadata");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jboss-metadata-appclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jboss-metadata-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jboss-metadata-ear");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jboss-metadata-ejb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jboss-metadata-web");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jboss-remote-naming");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jboss-remoting");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-log4j-jboss-logmanager");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-bindings");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-config");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-federation");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-idm-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-idm-impl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-idm-simple-schema");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-impl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-picketlink-wildfly8");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-undertow");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-wildfly");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-javadocs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-modules");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2016/01/06");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/09/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/09/28");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2017:2808";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL7", rpm:"jbossas-welcome-content-eap"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "JBoss EAP");
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"eap7-artemis-native-1.1.0-13.redhat_4.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"eap7-artemis-native-wildfly-1.1.0-13.redhat_4.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-bouncycastle-1.56.0-3.redhat_2.2.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-bouncycastle-mail-1.56.0-3.redhat_2.2.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-bouncycastle-pkix-1.56.0-3.redhat_2.2.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-bouncycastle-prov-1.56.0-3.redhat_2.2.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-hibernate-validator-5.2.5-2.Final_redhat_2.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-hibernate-validator-cdi-5.2.5-2.Final_redhat_2.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jasypt-1.9.2-2.redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jboss-jms-api_2.0_spec-1.0.1-2.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jboss-logmanager-2.0.7-2.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jboss-metadata-10.0.2-2.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jboss-metadata-appclient-10.0.2-2.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jboss-metadata-common-10.0.2-2.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jboss-metadata-ear-10.0.2-2.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jboss-metadata-ejb-10.0.2-2.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jboss-metadata-web-10.0.2-2.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jboss-remote-naming-2.0.5-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jboss-remoting-4.0.24-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-log4j-jboss-logmanager-1.1.4-2.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-picketlink-api-2.5.5-9.SP8_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-picketlink-bindings-2.5.5-9.SP8_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-picketlink-common-2.5.5-9.SP8_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-picketlink-config-2.5.5-9.SP8_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-picketlink-federation-2.5.5-9.SP8_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-picketlink-idm-api-2.5.5-9.SP8_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-picketlink-idm-impl-2.5.5-9.SP8_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-picketlink-idm-simple-schema-2.5.5-9.SP8_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-picketlink-impl-2.5.5-9.SP8_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-picketlink-wildfly8-2.5.5-9.SP8_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-undertow-1.3.31-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-wildfly-7.0.8-4.GA_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-wildfly-javadocs-7.0.8-1.GA_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-wildfly-modules-7.0.8-4.GA_redhat_1.1.ep7.el7")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "eap7-artemis-native / eap7-artemis-native-wildfly / etc");
      }
    }
    
  • NASL familyMisc.
    NASL idORACLE_IDENTITY_MANAGEMENT_CPU_OCT_2018.NASL
    descriptionThe remote host is missing the October 2018 Critical Patch Update for Oracle Identity Manager. It is, therefore, affected by multiple vulnerabilities as described in the October 2018 critical patch update advisory : - An unspecified vulnerability in the Oracle Identity Management Suite in the Suite Level Patch Issues (Apache Log4j) subcomponent could allow an unauthenticated, remote attacker with network access via HTTP to compromise Oracle Identity Management Suite. (CVE-2017-5645) - An unspecified vulnerability in the Oracle Identity Manager component of Oracle Fusion Middleware in the Advanced Console subcomponent could allow an unauthenticated, remote attacker with network access via HTTP to compromise Oracle Identity Manager. (CVE-2018-3179) - An unspecified vulnerability in the Oracle Identity Manager component of Oracle Fusion Middleware in the Installer (jackson-databind) subcomponent could allow an unauthenticated, remote attacker with network access via HTTP to compromise Oracle Identity Manager. (CVE-2017-15095) Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id118330
    published2018-10-23
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118330
    titleOracle Identity Manager Multiple Vulnerabilities (October 2018 CPU)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-2CCFBD650A.NASL
    descriptionSecurity fix for CVE-2017-5645 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-05-05
    plugin id99988
    published2017-05-05
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99988
    titleFedora 24 : log4j (2017-2ccfbd650a)
  • NASL familyJunos Local Security Checks
    NASL idJUNIPER_SPACE_JSA_10838.NASL
    descriptionAccording to its self-reported version number, the remote Junos Space version is prior to 17.2R1. It is, therefore, affected by multiple vulnerabilities.
    last seen2020-06-01
    modified2020-06-02
    plugin id108520
    published2018-03-21
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/108520
    titleJuniper Junos Space < 17.2R1 Multiple Vulnerabilities (JSA10838)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-8348115ACD.NASL
    descriptionSecurity fix for CVE-2017-5645 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-06-13
    plugin id100746
    published2017-06-13
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/100746
    titleFedora 25 : log4j12 (2017-8348115acd)
  • NASL familyCGI abuses
    NASL idMYSQL_ENTERPRISE_MONITOR_3_4_8.NASL
    descriptionAccording to its self-reported version, the MySQL Enterprise Monitor application running on the remote host is 3.4.x prior to 3.4.8, or 4.0.x prior to 4.0.5, or 8.0.x prior to 8.0.1. It is, therefore, affected by multiple vulnerabilities as noted in the July 2018 Critical Patch Update advisory. Please consult the CVRF details for the applicable CVEs for additional information. Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id111593
    published2018-08-08
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111593
    titleMySQL Enterprise Monitor 3.4.x < 3.4.8 / 4.0.x < 4.0.5 / 8.0.x < 8.0.1 Multiple Vulnerabilities (July 2018 CPU)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-7E0FF7F73A.NASL
    descriptionSecurity fix for CVE-2017-5645 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-06-13
    plugin id100745
    published2017-06-13
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/100745
    titleFedora 24 : log4j12 (2017-7e0ff7f73a)
  • NASL familyMisc.
    NASL idORACLE_WEBLOGIC_SERVER_CPU_APR_2018.NASL
    descriptionThe version of Oracle WebLogic Server installed on the remote host is affected by multiple vulnerabilities
    last seen2020-06-01
    modified2020-06-02
    plugin id109201
    published2018-04-20
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/109201
    titleOracle WebLogic Server Multiple Vulnerabilities (April 2018 CPU)
  • NASL familyMisc.
    NASL idORACLE_ENTERPRISE_MANAGER_JUL_2018_CPU.NASL
    descriptionThe version of Oracle Enterprise Manager Cloud Control installed on the remote host is affected by multiple vulnerabilities in the Enterprise Manager Base Platform component.
    last seen2020-06-01
    modified2020-06-02
    plugin id111152
    published2018-07-20
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111152
    titleOracle Enterprise Manager Cloud Control Multiple Vulnerabilities (July 2018 CPU)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2635.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.17 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.16, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645) * A vulnerability was discovered in the error page mechanism in Tomcat
    last seen2020-06-01
    modified2020-06-02
    plugin id103041
    published2017-09-08
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103041
    titleRHEL 6 : JBoss EAP (RHSA-2017:2635)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-11EDC0D6C3.NASL
    descriptionSecurity fix for CVE-2017-5645 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-07-17
    plugin id101576
    published2017-07-17
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/101576
    titleFedora 26 : log4j (2017-11edc0d6c3)
  • NASL familyMisc.
    NASL idORACLE_BI_PUBLISHER_OCT_2018_CPU.NASL
    descriptionThe version of Oracle Business Intelligence Publisher running on the remote host is 11.1.1.7.x prior to 11.1.1.7.181016, 11.1.1.9.x prior to 11.1.1.9.181016, 12.2.1.3.x prior to 12.2.1.3.181016, or 12.2.1.4.x prior to 12.2.1.4.181016. It is, therefore, affected by multiple vulnerabilities as noted in the October 2018 Critical Patch Update advisory: - A deserialization vulnerability exists in Apache Log4j 2.x before 2.8.2. An unauthenticated, remote attacker can exploit this, via a specially crafted binary, to execute arbitrary code on the target host (CVE-2017-5645). - An information disclosure vulnerability exists in Analytics Server, Oracle BI Publisher.Supported version affected is 12.2.1.3.0 An unauthenticated, remote attacker can exploit this, via HTTP, to disclose potentially sensitive information. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (CVE-2018-3204). - A deserialization vulnerability exists in Apache Batik 1.x before 1.10 due to subclass of `AbstractDocument`. An unauthenticated, remote attacker can exploit this, via deserializing subclass of `AbstractDocument`, to execute arbitrary code on the target host (CVE-2018-8013). Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-05-31
    modified2019-01-03
    plugin id120948
    published2019-01-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/120948
    titleOracle Business Intelligence Publisher Multiple Vulnerabilities (October 2018 CPU)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2017-1214.NASL
    descriptionAccording to the version of the log4j package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-06
    modified2017-09-11
    plugin id103072
    published2017-09-11
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103072
    titleEulerOS 2.0 SP2 : log4j (EulerOS-SA-2017-1214)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2017-2423.NASL
    descriptionFrom Red Hat Security Advisory 2017:2423 : An update for log4j is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Log4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es) : * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645)
    last seen2020-05-09
    modified2017-08-10
    plugin id102345
    published2017-08-10
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/102345
    titleOracle Linux 7 : log4j (ELSA-2017-2423)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-1801.NASL
    descriptionAn update is now available for Red Hat JBoss Web Server 3.1 for RHEL 6 and Red Hat JBoss Web Server 3.1 for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library. This release of Red Hat JBoss Web Server 3.1 Service Pack 1 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645) * A vulnerability was discovered in tomcat
    last seen2020-05-09
    modified2018-08-29
    plugin id112177
    published2018-08-29
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/112177
    titleRHEL 6 / 7 : Red Hat JBoss Web Server 3.1.0 Service Pack 1 (RHSA-2017:1801)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-511EBFA8A3.NASL
    descriptionSecurity fix for CVE-2017-5645 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-05-03
    plugin id99955
    published2017-05-03
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99955
    titleFedora 25 : log4j (2017-511ebfa8a3)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2017-2423.NASL
    descriptionAn update for log4j is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Log4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es) : * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645)
    last seen2020-05-09
    modified2017-09-01
    plugin id102878
    published2017-09-01
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/102878
    titleCentOS 7 : log4j (CESA-2017:2423)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2423.NASL
    descriptionAn update for log4j is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Log4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es) : * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645)
    last seen2020-05-09
    modified2017-08-10
    plugin id102348
    published2017-08-10
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/102348
    titleRHEL 7 : log4j (RHSA-2017:2423)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2637.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.17 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.16, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645) * A vulnerability was discovered in the error page mechanism in Tomcat
    last seen2020-06-01
    modified2020-06-02
    plugin id103043
    published2017-09-08
    reporterThis script is Copyright (C) 2017-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/103043
    titleRHEL 5 : JBoss EAP (RHSA-2017:2637)
  • NASL familyMisc.
    NASL idORACLE_OATS_CPU_JUL_2018.NASL
    descriptionThe version of Oracle Application Testing Suite installed on the remote host is affected by multiple vulnerabilities : - A remote code execution vulnerability exists in Apache Log4j 2.x before 2.8.2 due to the ability to receive serialized log events from another application. An unauthenticated, remote attacker can exploit this, via a specially crafted message, to execute arbitrary code on the remote host. (CVE-2017-5645) - A remote code execution vulnerability exists in Spring Framework due to the exposure of STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. An unauthenticated, remote attacker can exploit this, via a specially crafted message, to execute arbitrary code on the remote host. (CVE-2018-1275)
    last seen2020-06-01
    modified2020-06-02
    plugin id111210
    published2018-07-20
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111210
    titleOracle Application Testing Suite Multiple Vulnerabilities (April / July 2018 CPU)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2811.NASL
    descriptionAn update for eap7-jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 7.0 for Red Hat Enterprise Linux 6 and Red Hat JBoss Enterprise Application Platform 7.0 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The eap7-jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2). With this update, the eap7-jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 7.0.8. Refer to the JBoss Enterprise Application Platform 7.0.8 Release Notes, linked to in the References section, for information on the most significant bug fixes and enhancements included in this release. Security Fix(es) : * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645) * A vulnerability was found in Jasypt that would allow an attacker to perform a timing attack on password hash comparison. (CVE-2014-9970) * It was found that an information disclosure flaw in Bouncy Castle could enable a local malicious application to gain access to user
    last seen2020-05-09
    modified2017-09-27
    plugin id103500
    published2017-09-27
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103500
    titleRHEL 6 / 7 : eap7-jboss-ec2-eap (RHSA-2017:2811)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-3399.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 5 for Red Hat Enterprise Linux 5 and Red Hat JBoss Enterprise Application Platform 5 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This asynchronous patch is a security update for log4j package in Red Hat JBoss Enterprise Application Platform 5.2.0. Security Fix(es) : * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645)
    last seen2020-05-09
    modified2017-12-13
    plugin id105209
    published2017-12-13
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/105209
    titleRHEL 6 : JBoss EAP (RHSA-2017:3399)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-B8358CDA24.NASL
    descriptionSecurity fix for CVE-2017-5645 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-07-17
    plugin id101708
    published2017-07-17
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/101708
    titleFedora 26 : log4j12 (2017-b8358cda24)
  • NASL familyMisc.
    NASL idORACLE_GOLDENGATE_FOR_BIG_DATA_CPU_JAN_2019.NASL
    descriptionAccording to its self-reported version number, the Oracle GoldenGate for Big Data application located on the remote host 12.3.2.1.x less than 12.3.2.1.2. It is, therefore, affected by a remote code execution vulnerability due to insecure deserialization of log events received by the Apache Log4j subcomponent
    last seen2020-06-01
    modified2020-06-02
    plugin id133268
    published2020-01-28
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133268
    titleOracle GoldenGate for Big Data 12.3.2.1.x < 12.3.2.1.2 Apache Log4j Insecure Deserialization RCE (Jan 2019 CPU)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20170807_LOG4J_ON_SL7_X.NASL
    descriptionSecurity Fix(es) : - It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645)
    last seen2020-03-18
    modified2017-08-22
    plugin id102666
    published2017-08-22
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/102666
    titleScientific Linux Security Update : log4j on SL7.x (noarch) (20170807)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2638.NASL
    descriptionAn update for jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2). With this update, the jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 6.4.17. Security Fix(es) : * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645) * A vulnerability was discovered in the error page mechanism in Tomcat
    last seen2020-05-09
    modified2017-09-08
    plugin id103044
    published2017-09-08
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103044
    titleRHEL 6 : jboss-ec2-eap (RHSA-2017:2638)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2017-1213.NASL
    descriptionAccording to the version of the log4j package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-06
    modified2017-09-11
    plugin id103071
    published2017-09-11
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103071
    titleEulerOS 2.0 SP1 : log4j (EulerOS-SA-2017-1213)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2636.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.17 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.16, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645) * A vulnerability was discovered in the error page mechanism in Tomcat
    last seen2020-06-01
    modified2020-06-02
    plugin id103042
    published2017-09-08
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103042
    titleRHEL 7 : JBoss EAP (RHSA-2017:2636)
  • NASL familyWeb Servers
    NASL idSUN_JAVA_WEB_SERVER_7_0_27.NASL
    descriptionAccording to its self-reported version, the Oracle iPlanet Web Server (formerly known as Sun Java System Web Server) running on the remote host is 7.0.x prior to 7.0.27 Patch 26834070. It is, therefore, affected by an unspecified vulnerability in the Network Security Services (NSS) library with unknown impact.
    last seen2020-06-01
    modified2020-06-02
    plugin id106349
    published2018-01-25
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/106349
    titleOracle iPlanet Web Server 7.0.x < 7.0.27 NSS Unspecified Vulnerability (January 2018 CPU)
  • NASL familyWeb Servers
    NASL idORACLE_HTTP_SERVER_CPU_JAN_2018.NASL
    descriptionThe version of Oracle HTTP Server installed on the remote host is affected by multiple vulnerabilities as noted in the January 2018 CPU advisory.
    last seen2020-03-18
    modified2018-01-24
    plugin id106299
    published2018-01-24
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/106299
    titleOracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (January 2018 CPU)
  • NASL familyMisc.
    NASL idORACLE_SECURE_GLOBAL_DESKTOP_JAN_2018_CPU.NASL
    descriptionThe version of Oracle Secure Global Desktop installed on the remote host is 5.3 and is missing a security patch from the January 2018 Critical Patch Update (CPU). It is, therefore, affected by multiple vulnerabilities: - The included OpenSSL library has a off-by-one out-of-bounds read flaw within the X509v3_addr_get_afi() function of crypto/x509v3/v3_addr.c when handling the IPAddressFamily extension of X.509 certificates. A content-dependent attacker, with a specially crafted request, could potentially read limited memory information. (CVE-2017-3735) - The included OpenSSL library has a carry propagating flaw within the bn_sqrx8x_internal() function in crypto/bn/asm/x86_64-mont5.pl when handling RSA / DSA encryption. A content-dependent attacker, with a specially crafted request, could potentially determine the private key. (CVE-2017-3736) - The included Apache Log4j contains a flaw due to improper validation of log events before deserializing. A remote attacker, with a specially crafted log event, could potentially execute arbitrary script code. (CVE-2017-5645)
    last seen2020-06-01
    modified2020-06-02
    plugin id106199
    published2018-01-19
    reporterThis script is Copyright (C) 2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/106199
    titleOracle Secure Global Desktop Multiple Vulnerabilities (January 2018 CPU)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-2809.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 7.0 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.0.8 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.7, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645) * A vulnerability was found in Jasypt that would allow an attacker to perform a timing attack on password hash comparison. (CVE-2014-9970) * It was found that an information disclosure flaw in Bouncy Castle could enable a local malicious application to gain access to user
    last seen2020-06-01
    modified2020-06-02
    plugin id103527
    published2017-09-28
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103527
    titleRHEL 6 : JBoss EAP (RHSA-2017:2809)

Redhat

advisories
  • rhsa
    idRHSA-2017:1417
  • rhsa
    idRHSA-2017:1801
  • rhsa
    idRHSA-2017:1802
  • rhsa
    idRHSA-2017:2423
  • rhsa
    idRHSA-2017:2633
  • rhsa
    idRHSA-2017:2635
  • rhsa
    idRHSA-2017:2636
  • rhsa
    idRHSA-2017:2637
  • rhsa
    idRHSA-2017:2638
  • rhsa
    idRHSA-2017:2808
  • rhsa
    idRHSA-2017:2809
  • rhsa
    idRHSA-2017:2810
  • rhsa
    idRHSA-2017:2811
  • rhsa
    idRHSA-2017:2888
  • rhsa
    idRHSA-2017:2889
  • rhsa
    idRHSA-2017:3244
  • rhsa
    idRHSA-2017:3399
  • rhsa
    idRHSA-2017:3400
  • rhsa
    idRHSA-2019:1545
rpms
  • rh-java-common-log4j-0:1.2.17-15.15.el6
  • rh-java-common-log4j-0:1.2.17-15.15.el7
  • rh-java-common-log4j-javadoc-0:1.2.17-15.15.el6
  • rh-java-common-log4j-javadoc-0:1.2.17-15.15.el7
  • rh-java-common-log4j-manual-0:1.2.17-15.15.el6
  • rh-java-common-log4j-manual-0:1.2.17-15.15.el7
  • log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6
  • log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7
  • tomcat-native-0:1.2.8-10.redhat_10.ep7.el6
  • tomcat-native-0:1.2.8-10.redhat_10.ep7.el7
  • tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6
  • tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7
  • tomcat7-0:7.0.70-22.ep7.el6
  • tomcat7-0:7.0.70-22.ep7.el7
  • tomcat7-admin-webapps-0:7.0.70-22.ep7.el6
  • tomcat7-admin-webapps-0:7.0.70-22.ep7.el7
  • tomcat7-docs-webapp-0:7.0.70-22.ep7.el6
  • tomcat7-docs-webapp-0:7.0.70-22.ep7.el7
  • tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6
  • tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7
  • tomcat7-javadoc-0:7.0.70-22.ep7.el6
  • tomcat7-javadoc-0:7.0.70-22.ep7.el7
  • tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6
  • tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7
  • tomcat7-jsvc-0:7.0.70-22.ep7.el6
  • tomcat7-jsvc-0:7.0.70-22.ep7.el7
  • tomcat7-lib-0:7.0.70-22.ep7.el6
  • tomcat7-lib-0:7.0.70-22.ep7.el7
  • tomcat7-log4j-0:7.0.70-22.ep7.el6
  • tomcat7-log4j-0:7.0.70-22.ep7.el7
  • tomcat7-selinux-0:7.0.70-22.ep7.el6
  • tomcat7-selinux-0:7.0.70-22.ep7.el7
  • tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6
  • tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7
  • tomcat7-webapps-0:7.0.70-22.ep7.el6
  • tomcat7-webapps-0:7.0.70-22.ep7.el7
  • tomcat8-0:8.0.36-24.ep7.el6
  • tomcat8-0:8.0.36-24.ep7.el7
  • tomcat8-admin-webapps-0:8.0.36-24.ep7.el6
  • tomcat8-admin-webapps-0:8.0.36-24.ep7.el7
  • tomcat8-docs-webapp-0:8.0.36-24.ep7.el6
  • tomcat8-docs-webapp-0:8.0.36-24.ep7.el7
  • tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6
  • tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7
  • tomcat8-javadoc-0:8.0.36-24.ep7.el6
  • tomcat8-javadoc-0:8.0.36-24.ep7.el7
  • tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6
  • tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7
  • tomcat8-jsvc-0:8.0.36-24.ep7.el6
  • tomcat8-jsvc-0:8.0.36-24.ep7.el7
  • tomcat8-lib-0:8.0.36-24.ep7.el6
  • tomcat8-lib-0:8.0.36-24.ep7.el7
  • tomcat8-log4j-0:8.0.36-24.ep7.el6
  • tomcat8-log4j-0:8.0.36-24.ep7.el7
  • tomcat8-selinux-0:8.0.36-24.ep7.el6
  • tomcat8-selinux-0:8.0.36-24.ep7.el7
  • tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6
  • tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7
  • tomcat8-webapps-0:8.0.36-24.ep7.el6
  • tomcat8-webapps-0:8.0.36-24.ep7.el7
  • log4j-0:1.2.17-16.el7_4
  • log4j-javadoc-0:1.2.17-16.el7_4
  • log4j-manual-0:1.2.17-16.el7_4
  • apache-cxf-0:2.7.18-7.SP6_redhat_1.1.ep6.el6
  • codehaus-jackson-0:1.9.9-11.redhat_5.1.ep6.el6
  • codehaus-jackson-core-asl-0:1.9.9-11.redhat_5.1.ep6.el6
  • codehaus-jackson-jaxrs-0:1.9.9-11.redhat_5.1.ep6.el6
  • codehaus-jackson-mapper-asl-0:1.9.9-11.redhat_5.1.ep6.el6
  • codehaus-jackson-xc-0:1.9.9-11.redhat_5.1.ep6.el6
  • hibernate4-core-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el6
  • hibernate4-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el6
  • hibernate4-entitymanager-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el6
  • hibernate4-envers-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el6
  • hibernate4-infinispan-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el6
  • hornetq-0:2.3.25-22.SP20_redhat_1.1.ep6.el6
  • infinispan-0:5.2.22-1.Final_redhat_1.1.ep6.el6
  • infinispan-cachestore-jdbc-0:5.2.22-1.Final_redhat_1.1.ep6.el6
  • infinispan-cachestore-remote-0:5.2.22-1.Final_redhat_1.1.ep6.el6
  • infinispan-client-hotrod-0:5.2.22-1.Final_redhat_1.1.ep6.el6
  • infinispan-core-0:5.2.22-1.Final_redhat_1.1.ep6.el6
  • jboss-as-appclient-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-cli-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-client-all-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-clustering-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-cmp-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-configadmin-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-connector-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-controller-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-controller-client-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-core-security-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-deployment-repository-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-deployment-scanner-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-domain-http-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-domain-management-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-ee-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-ee-deployment-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-ejb3-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-embedded-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-host-controller-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-jacorb-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-jaxr-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-jaxrs-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-jdr-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-jmx-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-jpa-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-jsf-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-jsr77-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-logging-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-mail-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-management-client-content-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-messaging-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-modcluster-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-naming-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-network-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-osgi-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-osgi-configadmin-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-osgi-service-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-picketlink-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-platform-mbean-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-pojo-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-process-controller-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-protocol-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-remoting-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-sar-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-security-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-server-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-system-jmx-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-threads-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-transactions-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-version-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-web-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-webservices-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-weld-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-as-xts-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jboss-marshalling-0:1.4.10-3.SP3_redhat_1.1.ep6.el6
  • jboss-metadata-0:7.2.3-1.Final_redhat_1.1.ep6.el6
  • jboss-metadata-appclient-0:7.2.3-1.Final_redhat_1.1.ep6.el6
  • jboss-metadata-common-0:7.2.3-1.Final_redhat_1.1.ep6.el6
  • jboss-metadata-ear-0:7.2.3-1.Final_redhat_1.1.ep6.el6
  • jboss-metadata-ejb-0:7.2.3-1.Final_redhat_1.1.ep6.el6
  • jboss-metadata-web-0:7.2.3-1.Final_redhat_1.1.ep6.el6
  • jboss-modules-0:1.3.10-1.Final_redhat_1.1.ep6.el6
  • jboss-remoting3-0:3.3.10-1.Final_redhat_1.1.ep6.el6
  • jboss-vfs2-0:3.2.12-1.Final_redhat_1.1.ep6.el6
  • jbossas-appclient-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jbossas-bundles-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jbossas-core-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jbossas-domain-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jbossas-javadocs-0:7.5.17-4.Final_redhat_4.1.ep6.el6
  • jbossas-modules-eap-0:7.5.17-1.Final_redhat_4.1.ep6.el6
  • jbossas-product-eap-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jbossas-standalone-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jbossas-welcome-content-eap-0:7.5.17-2.Final_redhat_4.1.ep6.el6
  • jbossweb-0:7.5.24-1.Final_redhat_1.1.ep6.el6
  • log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6
  • log4j-jboss-logmanager-0:1.1.4-1.Final_redhat_1.1.ep6.el6
  • picketlink-bindings-0:2.5.4-17.SP15_redhat_1.1.ep6.el6
  • picketlink-federation-0:2.5.4-17.SP15_redhat_1.1.ep6.el6
  • apache-cxf-0:2.7.18-7.SP6_redhat_1.1.ep6.el7
  • codehaus-jackson-0:1.9.9-11.redhat_5.1.ep6.el7
  • codehaus-jackson-core-asl-0:1.9.9-11.redhat_5.1.ep6.el7
  • codehaus-jackson-jaxrs-0:1.9.9-11.redhat_5.1.ep6.el7
  • codehaus-jackson-mapper-asl-0:1.9.9-11.redhat_5.1.ep6.el7
  • codehaus-jackson-xc-0:1.9.9-11.redhat_5.1.ep6.el7
  • hibernate4-core-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el7
  • hibernate4-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el7
  • hibernate4-entitymanager-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el7
  • hibernate4-envers-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el7
  • hibernate4-infinispan-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el7
  • hornetq-0:2.3.25-22.SP20_redhat_1.1.ep6.el7
  • infinispan-0:5.2.22-1.Final_redhat_1.1.ep6.el7
  • infinispan-cachestore-jdbc-0:5.2.22-1.Final_redhat_1.1.ep6.el7
  • infinispan-cachestore-remote-0:5.2.22-1.Final_redhat_1.1.ep6.el7
  • infinispan-client-hotrod-0:5.2.22-1.Final_redhat_1.1.ep6.el7
  • infinispan-core-0:5.2.22-1.Final_redhat_1.1.ep6.el7
  • jboss-as-appclient-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-cli-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-client-all-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-clustering-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-cmp-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-configadmin-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-connector-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-controller-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-controller-client-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-core-security-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-deployment-repository-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-deployment-scanner-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-domain-http-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-domain-management-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-ee-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-ee-deployment-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-ejb3-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-embedded-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-host-controller-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-jacorb-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-jaxr-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-jaxrs-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-jdr-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-jmx-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-jpa-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-jsf-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-jsr77-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-logging-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-mail-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-management-client-content-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-messaging-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-modcluster-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-naming-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-network-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-osgi-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-osgi-configadmin-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-osgi-service-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-picketlink-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-platform-mbean-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-pojo-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-process-controller-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-protocol-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-remoting-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-sar-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-security-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-server-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-system-jmx-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-threads-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-transactions-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-version-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-web-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-webservices-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-weld-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-as-xts-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jboss-marshalling-0:1.4.10-3.SP3_redhat_1.1.ep6.el7
  • jboss-metadata-0:7.2.3-1.Final_redhat_1.1.ep6.el7
  • jboss-metadata-appclient-0:7.2.3-1.Final_redhat_1.1.ep6.el7
  • jboss-metadata-common-0:7.2.3-1.Final_redhat_1.1.ep6.el7
  • jboss-metadata-ear-0:7.2.3-1.Final_redhat_1.1.ep6.el7
  • jboss-metadata-ejb-0:7.2.3-1.Final_redhat_1.1.ep6.el7
  • jboss-metadata-web-0:7.2.3-1.Final_redhat_1.1.ep6.el7
  • jboss-modules-0:1.3.10-1.Final_redhat_1.1.ep6.el7
  • jboss-remoting3-0:3.3.10-1.Final_redhat_1.1.ep6.el7
  • jboss-vfs2-0:3.2.12-1.Final_redhat_1.1.ep6.el7
  • jbossas-appclient-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jbossas-bundles-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jbossas-core-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jbossas-domain-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jbossas-javadocs-0:7.5.17-4.Final_redhat_4.1.ep6.el7
  • jbossas-modules-eap-0:7.5.17-1.Final_redhat_4.1.ep6.el7
  • jbossas-product-eap-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jbossas-standalone-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jbossas-welcome-content-eap-0:7.5.17-2.Final_redhat_4.1.ep6.el7
  • jbossweb-0:7.5.24-1.Final_redhat_1.1.ep6.el7
  • log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7
  • log4j-jboss-logmanager-0:1.1.4-1.Final_redhat_1.1.ep6.el7
  • picketlink-bindings-0:2.5.4-17.SP15_redhat_1.1.ep6.el7
  • picketlink-federation-0:2.5.4-17.SP15_redhat_1.1.ep6.el7
  • apache-cxf-0:2.7.18-7.SP6_redhat_1.1.ep6.el5
  • codehaus-jackson-0:1.9.9-11.redhat_5.1.ep6.el5
  • codehaus-jackson-core-asl-0:1.9.9-11.redhat_5.1.ep6.el5
  • codehaus-jackson-jaxrs-0:1.9.9-11.redhat_5.1.ep6.el5
  • codehaus-jackson-mapper-asl-0:1.9.9-11.redhat_5.1.ep6.el5
  • codehaus-jackson-xc-0:1.9.9-11.redhat_5.1.ep6.el5
  • hibernate4-core-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el5
  • hibernate4-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el5
  • hibernate4-entitymanager-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el5
  • hibernate4-envers-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el5
  • hibernate4-infinispan-eap6-0:4.2.27-1.Final_redhat_1.1.ep6.el5
  • hornetq-0:2.3.25-22.SP20_redhat_1.1.ep6.el5
  • infinispan-0:5.2.22-1.Final_redhat_1.1.ep6.el5
  • infinispan-cachestore-jdbc-0:5.2.22-1.Final_redhat_1.1.ep6.el5
  • infinispan-cachestore-remote-0:5.2.22-1.Final_redhat_1.1.ep6.el5
  • infinispan-client-hotrod-0:5.2.22-1.Final_redhat_1.1.ep6.el5
  • infinispan-core-0:5.2.22-1.Final_redhat_1.1.ep6.el5
  • jboss-as-appclient-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-cli-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-client-all-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-clustering-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-cmp-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-configadmin-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-connector-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-controller-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-controller-client-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-core-security-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-deployment-repository-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-deployment-scanner-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-domain-http-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-domain-management-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-ee-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-ee-deployment-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-ejb3-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-embedded-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-host-controller-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-jacorb-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-jaxr-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-jaxrs-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-jdr-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-jmx-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-jpa-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-jsf-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-jsr77-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-logging-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-mail-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-management-client-content-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-messaging-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-modcluster-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-naming-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-network-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-osgi-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-osgi-configadmin-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-osgi-service-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-picketlink-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-platform-mbean-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-pojo-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-process-controller-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-protocol-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-remoting-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-sar-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-security-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-server-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-system-jmx-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-threads-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-transactions-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-version-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-web-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-webservices-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-weld-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-as-xts-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jboss-marshalling-0:1.4.10-3.SP3_redhat_1.1.ep6.el5
  • jboss-metadata-0:7.2.3-1.Final_redhat_1.1.ep6.el5
  • jboss-metadata-appclient-0:7.2.3-1.Final_redhat_1.1.ep6.el5
  • jboss-metadata-common-0:7.2.3-1.Final_redhat_1.1.ep6.el5
  • jboss-metadata-ear-0:7.2.3-1.Final_redhat_1.1.ep6.el5
  • jboss-metadata-ejb-0:7.2.3-1.Final_redhat_1.1.ep6.el5
  • jboss-metadata-web-0:7.2.3-1.Final_redhat_1.1.ep6.el5
  • jboss-modules-0:1.3.10-1.Final_redhat_1.1.ep6.el5
  • jboss-remoting3-0:3.3.10-1.Final_redhat_1.1.ep6.el5
  • jboss-vfs2-0:3.2.12-1.Final_redhat_1.1.ep6.el5
  • jbossas-appclient-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jbossas-bundles-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jbossas-core-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jbossas-domain-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jbossas-javadocs-0:7.5.17-4.Final_redhat_4.1.ep6.el5
  • jbossas-modules-eap-0:7.5.17-1.Final_redhat_4.1.ep6.el5
  • jbossas-product-eap-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jbossas-standalone-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jbossas-welcome-content-eap-0:7.5.17-2.Final_redhat_4.1.ep6.el5
  • jbossweb-0:7.5.24-1.Final_redhat_1.1.ep6.el5
  • log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el5
  • log4j-jboss-logmanager-0:1.1.4-1.Final_redhat_1.1.ep6.el5
  • picketlink-bindings-0:2.5.4-17.SP15_redhat_1.1.ep6.el5
  • picketlink-federation-0:2.5.4-17.SP15_redhat_1.1.ep6.el5
  • jboss-ec2-eap-0:7.5.17-1.Final_redhat_4.ep6.el6
  • jboss-ec2-eap-samples-0:7.5.17-1.Final_redhat_4.ep6.el6
  • eap7-artemis-native-0:1.1.0-13.redhat_4.ep7.el7
  • eap7-artemis-native-wildfly-0:1.1.0-13.redhat_4.ep7.el7
  • eap7-bouncycastle-0:1.56.0-3.redhat_2.2.ep7.el7
  • eap7-bouncycastle-mail-0:1.56.0-3.redhat_2.2.ep7.el7
  • eap7-bouncycastle-pkix-0:1.56.0-3.redhat_2.2.ep7.el7
  • eap7-bouncycastle-prov-0:1.56.0-3.redhat_2.2.ep7.el7
  • eap7-hibernate-validator-0:5.2.5-2.Final_redhat_2.1.ep7.el7
  • eap7-hibernate-validator-cdi-0:5.2.5-2.Final_redhat_2.1.ep7.el7
  • eap7-jasypt-0:1.9.2-2.redhat_1.1.ep7.el7
  • eap7-jboss-jms-api_2.0_spec-0:1.0.1-2.Final_redhat_1.1.ep7.el7
  • eap7-jboss-logmanager-0:2.0.7-2.Final_redhat_1.1.ep7.el7
  • eap7-jboss-metadata-0:10.0.2-2.Final_redhat_1.1.ep7.el7
  • eap7-jboss-metadata-appclient-0:10.0.2-2.Final_redhat_1.1.ep7.el7
  • eap7-jboss-metadata-common-0:10.0.2-2.Final_redhat_1.1.ep7.el7
  • eap7-jboss-metadata-ear-0:10.0.2-2.Final_redhat_1.1.ep7.el7
  • eap7-jboss-metadata-ejb-0:10.0.2-2.Final_redhat_1.1.ep7.el7
  • eap7-jboss-metadata-web-0:10.0.2-2.Final_redhat_1.1.ep7.el7
  • eap7-jboss-remote-naming-0:2.0.5-1.Final_redhat_1.1.ep7.el7
  • eap7-jboss-remoting-0:4.0.24-1.Final_redhat_1.1.ep7.el7
  • eap7-log4j-jboss-logmanager-0:1.1.4-2.Final_redhat_1.1.ep7.el7
  • eap7-picketlink-api-0:2.5.5-9.SP8_redhat_1.1.ep7.el7
  • eap7-picketlink-bindings-0:2.5.5-9.SP8_redhat_1.1.ep7.el7
  • eap7-picketlink-common-0:2.5.5-9.SP8_redhat_1.1.ep7.el7
  • eap7-picketlink-config-0:2.5.5-9.SP8_redhat_1.1.ep7.el7
  • eap7-picketlink-federation-0:2.5.5-9.SP8_redhat_1.1.ep7.el7
  • eap7-picketlink-idm-api-0:2.5.5-9.SP8_redhat_1.1.ep7.el7
  • eap7-picketlink-idm-impl-0:2.5.5-9.SP8_redhat_1.1.ep7.el7
  • eap7-picketlink-idm-simple-schema-0:2.5.5-9.SP8_redhat_1.1.ep7.el7
  • eap7-picketlink-impl-0:2.5.5-9.SP8_redhat_1.1.ep7.el7
  • eap7-picketlink-wildfly8-0:2.5.5-9.SP8_redhat_1.1.ep7.el7
  • eap7-undertow-0:1.3.31-1.Final_redhat_1.1.ep7.el7
  • eap7-wildfly-0:7.0.8-4.GA_redhat_1.1.ep7.el7
  • eap7-wildfly-javadocs-0:7.0.8-1.GA_redhat_1.1.ep7.el7
  • eap7-wildfly-modules-0:7.0.8-4.GA_redhat_1.1.ep7.el7
  • eap7-artemis-native-0:1.1.0-13.redhat_4.ep7.el6
  • eap7-artemis-native-wildfly-0:1.1.0-13.redhat_4.ep7.el6
  • eap7-bouncycastle-0:1.56.0-3.redhat_2.2.ep7.el6
  • eap7-bouncycastle-mail-0:1.56.0-3.redhat_2.2.ep7.el6
  • eap7-bouncycastle-pkix-0:1.56.0-3.redhat_2.2.ep7.el6
  • eap7-bouncycastle-prov-0:1.56.0-3.redhat_2.2.ep7.el6
  • eap7-hibernate-validator-0:5.2.5-2.Final_redhat_2.1.ep7.el6
  • eap7-hibernate-validator-cdi-0:5.2.5-2.Final_redhat_2.1.ep7.el6
  • eap7-jasypt-0:1.9.2-2.redhat_1.1.ep7.el6
  • eap7-jboss-jms-api_2.0_spec-0:1.0.1-2.Final_redhat_1.1.ep7.el6
  • eap7-jboss-logmanager-0:2.0.7-2.Final_redhat_1.1.ep7.el6
  • eap7-jboss-metadata-0:10.0.2-2.Final_redhat_1.1.ep7.el6
  • eap7-jboss-metadata-appclient-0:10.0.2-2.Final_redhat_1.1.ep7.el6
  • eap7-jboss-metadata-common-0:10.0.2-2.Final_redhat_1.1.ep7.el6
  • eap7-jboss-metadata-ear-0:10.0.2-2.Final_redhat_1.1.ep7.el6
  • eap7-jboss-metadata-ejb-0:10.0.2-2.Final_redhat_1.1.ep7.el6
  • eap7-jboss-metadata-web-0:10.0.2-2.Final_redhat_1.1.ep7.el6
  • eap7-jboss-remote-naming-0:2.0.5-1.Final_redhat_1.1.ep7.el6
  • eap7-jboss-remoting-0:4.0.24-1.Final_redhat_1.1.ep7.el6
  • eap7-log4j-jboss-logmanager-0:1.1.4-2.Final_redhat_1.1.ep7.el6
  • eap7-picketlink-api-0:2.5.5-9.SP8_redhat_1.1.ep7.el6
  • eap7-picketlink-bindings-0:2.5.5-9.SP8_redhat_1.1.ep7.el6
  • eap7-picketlink-common-0:2.5.5-9.SP8_redhat_1.1.ep7.el6
  • eap7-picketlink-config-0:2.5.5-9.SP8_redhat_1.1.ep7.el6
  • eap7-picketlink-federation-0:2.5.5-9.SP8_redhat_1.1.ep7.el6
  • eap7-picketlink-idm-api-0:2.5.5-9.SP8_redhat_1.1.ep7.el6
  • eap7-picketlink-idm-impl-0:2.5.5-9.SP8_redhat_1.1.ep7.el6
  • eap7-picketlink-idm-simple-schema-0:2.5.5-9.SP8_redhat_1.1.ep7.el6
  • eap7-picketlink-impl-0:2.5.5-9.SP8_redhat_1.1.ep7.el6
  • eap7-picketlink-wildfly8-0:2.5.5-9.SP8_redhat_1.1.ep7.el6
  • eap7-undertow-0:1.3.31-1.Final_redhat_1.1.ep7.el6
  • eap7-wildfly-0:7.0.8-4.GA_redhat_1.1.ep7.el6
  • eap7-wildfly-javadocs-0:7.0.8-1.GA_redhat_1.1.ep7.el6
  • eap7-wildfly-modules-0:7.0.8-4.GA_redhat_1.1.ep7.el6
  • eap7-jboss-ec2-eap-0:7.0.8-1.GA_redhat_1.ep7.el6
  • eap7-jboss-ec2-eap-0:7.0.8-1.GA_redhat_1.ep7.el7
  • eap7-jboss-ec2-eap-samples-0:7.0.8-1.GA_redhat_1.ep7.el6
  • eap7-jboss-ec2-eap-samples-0:7.0.8-1.GA_redhat_1.ep7.el7
  • log4j-0:1.2.14-19.patch_01.ep5.el5
  • log4j-0:1.2.14-19.patch_01.ep5.el6

Seebug

bulletinFamilyexploit
descriptionVersions Affected: all versions from 2.0-alpha1 to 2.8.1 Description: When using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code. Mitigation: Java 7+ users should migrate to version 2.8.2 or avoid using the socket server classes. Java 6 users should avoid using the TCP or UDP socket server classes, or they can manually backport the security fix from 2.8.2: <https://git-wip-us.apache.org/repos/asf?p=logging-log4j2. git;h=5dcc192> Credit: This issue was discovered by Marcio Almeida de Macedo of Red Team at Telstra
idSSV:92965
last seen2017-11-19
modified2017-04-18
published2017-04-18
reporterRoot
titleApache Log4j socket receiver deserialization vulnerability (CVE-2017-5645)

References