Vulnerabilities > CVE-2017-6056 - Infinite Loop vulnerability in multiple products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
low complexity
canonical
debian
CWE-835
nessus

Summary

It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu.

Vulnerable Configurations

Part Description Count
OS
Canonical
2
OS
Debian
1

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-0828.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release of Red Hat JBoss Enterprise Application Platform 6.4.14 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.13, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted. (CVE-2016-8657) * It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. (CVE-2017-6056) * It was found that GZIPInterceptor is enabled when not necessarily required in RESTEasy. An attacker could use this flaw to launch a Denial of Service attack. (CVE-2016-6346) Red Hat would like to thank Mikhail Egorov (Odin) for reporting the CVE-2016-6346 issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id112253
    published2018-09-04
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/112253
    titleRHEL 7 : JBoss EAP (RHSA-2017:0828)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2017:0828. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(112253);
      script_version("1.7");
      script_cvs_date("Date: 2019/10/24 15:35:42");
    
      script_cve_id("CVE-2016-6346", "CVE-2016-8657", "CVE-2017-6056");
      script_xref(name:"RHSA", value:"2017:0828");
    
      script_name(english:"RHEL 7 : JBoss EAP (RHSA-2017:0828)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update is now available for Red Hat JBoss Enterprise Application
    Platform 6.4 for RHEL 7.
    
    Red Hat Product Security has rated this update as having a security
    impact of Important. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
    applications based on JBoss Application Server 7.
    
    This release of Red Hat JBoss Enterprise Application Platform 6.4.14
    serves as a replacement for Red Hat JBoss Enterprise Application
    Platform 6.4.13, and includes bug fixes and enhancements, which are
    documented in the Release Notes document linked to in the References.
    
    Security Fix(es) :
    
    * It was discovered that EAP packages in certain versions of Red Hat
    Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas
    configuration files. The file is writable to jboss group (root:jboss,
    664). On systems using classic /etc/init.d init scripts (i.e. on Red
    Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss
    init script and its content executed with root privileges when jboss
    service is started, stopped, or restarted. (CVE-2016-8657)
    
    * It was discovered that a programming error in the processing of
    HTTPS requests in the Apache Tomcat servlet and JSP engine may result
    in denial of service via an infinite loop. (CVE-2017-6056)
    
    * It was found that GZIPInterceptor is enabled when not necessarily
    required in RESTEasy. An attacker could use this flaw to launch a
    Denial of Service attack. (CVE-2016-6346)
    
    Red Hat would like to thank Mikhail Egorov (Odin) for reporting the
    CVE-2016-6346 issue."
      );
      # https://access.redhat.com/documentation/en/
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/documentation/en-us/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2017:0828"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2016-6346"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2016-8657"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-6056"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:apache-cxf");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:hornetq");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-cachestore-jdbc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-cachestore-remote");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-client-hotrod");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-core");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-appclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-cli");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-client-all");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-clustering");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-cmp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-configadmin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-connector");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-controller");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-controller-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-core-security");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-deployment-repository");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-deployment-scanner");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-domain-http");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-domain-management");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-ee");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-ee-deployment");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-ejb3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-embedded");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-host-controller");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jacorb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jaxr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jaxrs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jdr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jmx");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jpa");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jsf");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jsr77");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-logging");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-mail");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-management-client-content");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-messaging");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-modcluster");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-naming");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-network");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-osgi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-osgi-configadmin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-osgi-service");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-picketlink");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-platform-mbean");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-pojo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-process-controller");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-protocol");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-remoting");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-sar");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-security");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-system-jmx");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-threads");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-transactions");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-version");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-web");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-webservices");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-weld");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-xts");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-modules");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-msc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-remoting3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-appclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-bundles");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-core");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-domain");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-javadocs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-modules-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-product-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-standalone");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-welcome-content-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossts");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossweb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:picketbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:resteasy");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:weld-core");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2016/09/07");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/03/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/09/04");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2017:0828";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL7", rpm:"jbossas-welcome-content-eap"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "JBoss EAP");
    
      if (rpm_check(release:"RHEL7", reference:"apache-cxf-2.7.18-6.SP5_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"hornetq-2.3.25-19.SP17_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"infinispan-5.2.21-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"infinispan-cachestore-jdbc-5.2.21-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"infinispan-cachestore-remote-5.2.21-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"infinispan-client-hotrod-5.2.21-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"infinispan-core-5.2.21-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-appclient-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-cli-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-client-all-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-clustering-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-cmp-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-configadmin-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-connector-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-controller-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-controller-client-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-core-security-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-deployment-repository-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-deployment-scanner-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-domain-http-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-domain-management-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-ee-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-ee-deployment-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-ejb3-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-embedded-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-host-controller-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jacorb-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jaxr-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jaxrs-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jdr-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jmx-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jpa-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jsf-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jsr77-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-logging-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-mail-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-management-client-content-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-messaging-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-modcluster-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-naming-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-network-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-osgi-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-osgi-configadmin-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-osgi-service-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-picketlink-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-platform-mbean-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-pojo-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-process-controller-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-protocol-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-remoting-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-sar-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-security-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-server-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-system-jmx-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-threads-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-transactions-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-version-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-web-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-webservices-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-weld-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-xts-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-modules-1.3.8-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-msc-1.1.7-1.SP1_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-remoting3-3.3.9-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-appclient-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-bundles-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-core-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-domain-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-javadocs-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-modules-eap-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-product-eap-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-standalone-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-welcome-content-eap-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossts-4.17.39-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossweb-7.5.21-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"picketbox-4.1.4-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"resteasy-2.3.17-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"weld-core-1.1.34-1.Final_redhat_1.1.ep6.el7")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "apache-cxf / hornetq / infinispan / infinispan-cachestore-jdbc / etc");
      }
    }
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3204-1.NASL
    descriptionIt was discovered that Tomcat incorrectly handled certain HTTP requests. A remote attacker could possibly use this issue to cause Tomcat to consume resources, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id97304
    published2017-02-21
    reporterUbuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97304
    titleUbuntu 12.04 LTS / 14.04 LTS : tomcat6, tomcat7 vulnerability (USN-3204-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-3204-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(97304);
      script_version("3.6");
      script_cvs_date("Date: 2019/09/18 12:31:46");
    
      script_cve_id("CVE-2017-6056");
      script_xref(name:"USN", value:"3204-1");
    
      script_name(english:"Ubuntu 12.04 LTS / 14.04 LTS : tomcat6, tomcat7 vulnerability (USN-3204-1)");
      script_summary(english:"Checks dpkg output for updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Ubuntu host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It was discovered that Tomcat incorrectly handled certain HTTP
    requests. A remote attacker could possibly use this issue to cause
    Tomcat to consume resources, resulting in a denial of service.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/3204-1/"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libtomcat6-java");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libtomcat7-java");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:tomcat6");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:tomcat7");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:12.04:-:lts");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2017/02/17");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/02/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/02/21");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! preg(pattern:"^(12\.04|14\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 12.04 / 14.04", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"12.04", pkgname:"libtomcat6-java", pkgver:"6.0.35-1ubuntu3.11")) flag++;
    if (ubuntu_check(osver:"12.04", pkgname:"tomcat6", pkgver:"6.0.35-1ubuntu3.11")) flag++;
    if (ubuntu_check(osver:"14.04", pkgname:"libtomcat7-java", pkgver:"7.0.52-1ubuntu0.10")) flag++;
    if (ubuntu_check(osver:"14.04", pkgname:"tomcat7", pkgver:"7.0.52-1ubuntu0.10")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libtomcat6-java / libtomcat7-java / tomcat6 / tomcat7");
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-823.NASL
    descriptionThe update for tomcat7 issued as DLA-823-1 caused that the server could return HTTP 400 errors under certain circumstances. Updated packages are now available to correct this issue. For reference, the original advisory text follows. It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. For Debian 7
    last seen2020-03-17
    modified2017-02-15
    plugin id97150
    published2017-02-15
    reporterThis script is Copyright (C) 2017-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/97150
    titleDebian DLA-823-2 : tomcat7 regression update
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Debian Security Advisory DLA-823-2. The text
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(97150);
      script_version("3.5");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2017-6056");
    
      script_name(english:"Debian DLA-823-2 : tomcat7 regression update");
      script_summary(english:"Checks dpkg output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The update for tomcat7 issued as DLA-823-1 caused that the server
    could return HTTP 400 errors under certain circumstances. Updated
    packages are now available to correct this issue. For reference, the
    original advisory text follows.
    
    It was discovered that a programming error in the processing of HTTPS
    requests in the Apache Tomcat servlet and JSP engine may result in
    denial of service via an infinite loop.
    
    For Debian 7 'Wheezy', these problems have been fixed in version
    7.0.28-4+deb7u11.
    
    We recommend that you upgrade your tomcat7 packages.
    
    NOTE: Tenable Network Security has extracted the preceding description
    block directly from the DLA security advisory. Tenable has attempted
    to automatically clean and format it as much as possible without
    introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.debian.org/debian-lts-announce/2017/02/msg00022.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/wheezy/tomcat7"
      );
      script_set_attribute(attribute:"solution", value:"Upgrade the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libservlet3.0-java");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libservlet3.0-java-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libtomcat7-java");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:tomcat7");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:tomcat7-admin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:tomcat7-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:tomcat7-docs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:tomcat7-examples");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:tomcat7-user");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2017/02/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/02/15");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2020 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"7.0", prefix:"libservlet3.0-java", reference:"7.0.28-4+deb7u11")) flag++;
    if (deb_check(release:"7.0", prefix:"libservlet3.0-java-doc", reference:"7.0.28-4+deb7u11")) flag++;
    if (deb_check(release:"7.0", prefix:"libtomcat7-java", reference:"7.0.28-4+deb7u11")) flag++;
    if (deb_check(release:"7.0", prefix:"tomcat7", reference:"7.0.28-4+deb7u11")) flag++;
    if (deb_check(release:"7.0", prefix:"tomcat7-admin", reference:"7.0.28-4+deb7u11")) flag++;
    if (deb_check(release:"7.0", prefix:"tomcat7-common", reference:"7.0.28-4+deb7u11")) flag++;
    if (deb_check(release:"7.0", prefix:"tomcat7-docs", reference:"7.0.28-4+deb7u11")) flag++;
    if (deb_check(release:"7.0", prefix:"tomcat7-examples", reference:"7.0.28-4+deb7u11")) flag++;
    if (deb_check(release:"7.0", prefix:"tomcat7-user", reference:"7.0.28-4+deb7u11")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3788.NASL
    descriptionIt was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop.
    last seen2020-06-01
    modified2020-06-02
    plugin id97137
    published2017-02-14
    reporterThis script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97137
    titleDebian DSA-3788-1 : tomcat8 - security update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-3788. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(97137);
      script_version("3.5");
      script_cvs_date("Date: 2018/11/10 11:49:38");
    
      script_cve_id("CVE-2017-6056");
      script_xref(name:"DSA", value:"3788");
    
      script_name(english:"Debian DSA-3788-1 : tomcat8 - security update");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It was discovered that a programming error in the processing of HTTPS
    requests in the Apache Tomcat servlet and JSP engine may result in
    denial of service via an infinite loop."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851304"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/jessie/tomcat8"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2017/dsa-3788"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the tomcat8 packages.
    
    For the stable distribution (jessie), this problem has been fixed in
    version 8.0.14-1+deb8u7."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:tomcat8");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2017/02/13");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/02/14");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"8.0", prefix:"libservlet3.1-java", reference:"8.0.14-1+deb8u7")) flag++;
    if (deb_check(release:"8.0", prefix:"libservlet3.1-java-doc", reference:"8.0.14-1+deb8u7")) flag++;
    if (deb_check(release:"8.0", prefix:"libtomcat8-java", reference:"8.0.14-1+deb8u7")) flag++;
    if (deb_check(release:"8.0", prefix:"tomcat8", reference:"8.0.14-1+deb8u7")) flag++;
    if (deb_check(release:"8.0", prefix:"tomcat8-admin", reference:"8.0.14-1+deb8u7")) flag++;
    if (deb_check(release:"8.0", prefix:"tomcat8-common", reference:"8.0.14-1+deb8u7")) flag++;
    if (deb_check(release:"8.0", prefix:"tomcat8-docs", reference:"8.0.14-1+deb8u7")) flag++;
    if (deb_check(release:"8.0", prefix:"tomcat8-examples", reference:"8.0.14-1+deb8u7")) flag++;
    if (deb_check(release:"8.0", prefix:"tomcat8-user", reference:"8.0.14-1+deb8u7")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3787.NASL
    descriptionIt was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop.
    last seen2020-06-01
    modified2020-06-02
    plugin id97136
    published2017-02-14
    reporterThis script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97136
    titleDebian DSA-3787-1 : tomcat7 - security update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-3787. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(97136);
      script_version("3.6");
      script_cvs_date("Date: 2018/11/10 11:49:38");
    
      script_cve_id("CVE-2017-6056");
      script_xref(name:"DSA", value:"3787");
    
      script_name(english:"Debian DSA-3787-1 : tomcat7 - security update");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It was discovered that a programming error in the processing of HTTPS
    requests in the Apache Tomcat servlet and JSP engine may result in
    denial of service via an infinite loop."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854551"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/jessie/tomcat7"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2017/dsa-3787"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the tomcat7 packages.
    
    For the stable distribution (jessie), this problem has been fixed in
    version 7.0.56-3+deb8u8."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:tomcat7");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2017/02/13");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/02/14");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"8.0", prefix:"libservlet3.0-java", reference:"7.0.56-3+deb8u8")) flag++;
    if (deb_check(release:"8.0", prefix:"libservlet3.0-java-doc", reference:"7.0.56-3+deb8u8")) flag++;
    if (deb_check(release:"8.0", prefix:"libtomcat7-java", reference:"7.0.56-3+deb8u8")) flag++;
    if (deb_check(release:"8.0", prefix:"tomcat7", reference:"7.0.56-3+deb8u8")) flag++;
    if (deb_check(release:"8.0", prefix:"tomcat7-admin", reference:"7.0.56-3+deb8u8")) flag++;
    if (deb_check(release:"8.0", prefix:"tomcat7-common", reference:"7.0.56-3+deb8u8")) flag++;
    if (deb_check(release:"8.0", prefix:"tomcat7-docs", reference:"7.0.56-3+deb8u8")) flag++;
    if (deb_check(release:"8.0", prefix:"tomcat7-examples", reference:"7.0.56-3+deb8u8")) flag++;
    if (deb_check(release:"8.0", prefix:"tomcat7-user", reference:"7.0.56-3+deb8u8")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-0827.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release of Red Hat JBoss Enterprise Application Platform 6.4.14 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.13, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted. (CVE-2016-8657) * It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. (CVE-2017-6056) * It was found that GZIPInterceptor is enabled when not necessarily required in RESTEasy. An attacker could use this flaw to launch a Denial of Service attack. (CVE-2016-6346) Red Hat would like to thank Mikhail Egorov (Odin) for reporting the CVE-2016-6346 issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id97933
    published2017-03-24
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97933
    titleRHEL 6 : JBoss EAP (RHSA-2017:0827)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2017:0827. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(97933);
      script_version("3.10");
      script_cvs_date("Date: 2019/10/24 15:35:42");
    
      script_cve_id("CVE-2016-6346", "CVE-2016-8657", "CVE-2017-6056");
      script_xref(name:"RHSA", value:"2017:0827");
    
      script_name(english:"RHEL 6 : JBoss EAP (RHSA-2017:0827)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update is now available for Red Hat JBoss Enterprise Application
    Platform 6.4 for RHEL 6.
    
    Red Hat Product Security has rated this update as having a security
    impact of Important. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
    applications based on JBoss Application Server 7.
    
    This release of Red Hat JBoss Enterprise Application Platform 6.4.14
    serves as a replacement for Red Hat JBoss Enterprise Application
    Platform 6.4.13, and includes bug fixes and enhancements, which are
    documented in the Release Notes document linked to in the References.
    
    Security Fix(es) :
    
    * It was discovered that EAP packages in certain versions of Red Hat
    Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas
    configuration files. The file is writable to jboss group (root:jboss,
    664). On systems using classic /etc/init.d init scripts (i.e. on Red
    Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss
    init script and its content executed with root privileges when jboss
    service is started, stopped, or restarted. (CVE-2016-8657)
    
    * It was discovered that a programming error in the processing of
    HTTPS requests in the Apache Tomcat servlet and JSP engine may result
    in denial of service via an infinite loop. (CVE-2017-6056)
    
    * It was found that GZIPInterceptor is enabled when not necessarily
    required in RESTEasy. An attacker could use this flaw to launch a
    Denial of Service attack. (CVE-2016-6346)
    
    Red Hat would like to thank Mikhail Egorov (Odin) for reporting the
    CVE-2016-6346 issue."
      );
      # https://access.redhat.com/documentation/en/
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/documentation/en-us/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2017:0827"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2016-6346"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2016-8657"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-6056"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:apache-cxf");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:hornetq");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-cachestore-jdbc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-cachestore-remote");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-client-hotrod");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-core");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-appclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-cli");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-client-all");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-clustering");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-cmp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-configadmin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-connector");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-controller");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-controller-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-core-security");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-deployment-repository");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-deployment-scanner");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-domain-http");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-domain-management");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-ee");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-ee-deployment");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-ejb3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-embedded");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-host-controller");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jacorb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jaxr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jaxrs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jdr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jmx");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jpa");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jsf");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jsr77");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-logging");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-mail");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-management-client-content");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-messaging");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-modcluster");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-naming");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-network");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-osgi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-osgi-configadmin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-osgi-service");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-picketlink");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-platform-mbean");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-pojo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-process-controller");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-protocol");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-remoting");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-sar");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-security");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-system-jmx");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-threads");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-transactions");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-version");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-web");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-webservices");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-weld");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-xts");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-modules");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-msc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-remoting3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-appclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-bundles");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-core");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-domain");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-javadocs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-modules-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-product-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-standalone");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-welcome-content-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossts");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossweb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:picketbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:resteasy");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:weld-core");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2016/09/07");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/03/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/03/24");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2017:0827";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL6", rpm:"jbossas-welcome-content-eap"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "JBoss EAP");
    
      if (rpm_check(release:"RHEL6", reference:"apache-cxf-2.7.18-6.SP5_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"hornetq-2.3.25-19.SP17_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"infinispan-5.2.21-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"infinispan-cachestore-jdbc-5.2.21-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"infinispan-cachestore-remote-5.2.21-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"infinispan-client-hotrod-5.2.21-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"infinispan-core-5.2.21-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-appclient-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-cli-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-client-all-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-clustering-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-cmp-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-configadmin-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-connector-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-controller-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-controller-client-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-core-security-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-deployment-repository-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-deployment-scanner-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-domain-http-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-domain-management-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-ee-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-ee-deployment-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-ejb3-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-embedded-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-host-controller-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jacorb-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jaxr-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jaxrs-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jdr-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jmx-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jpa-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jsf-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jsr77-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-logging-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-mail-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-management-client-content-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-messaging-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-modcluster-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-naming-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-network-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-osgi-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-osgi-configadmin-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-osgi-service-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-picketlink-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-platform-mbean-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-pojo-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-process-controller-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-protocol-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-remoting-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-sar-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-security-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-server-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-system-jmx-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-threads-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-transactions-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-version-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-web-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-webservices-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-weld-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-xts-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-modules-1.3.8-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-msc-1.1.7-1.SP1_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-remoting3-3.3.9-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-appclient-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-bundles-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-core-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-domain-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-javadocs-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-modules-eap-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-product-eap-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-standalone-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-welcome-content-eap-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossts-4.17.39-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossweb-7.5.21-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"picketbox-4.1.4-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"resteasy-2.3.17-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"weld-core-1.1.34-1.Final_redhat_1.1.ep6.el6")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "apache-cxf / hornetq / infinispan / infinispan-cachestore-jdbc / etc");
      }
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-0826.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release of Red Hat JBoss Enterprise Application Platform 6.4.14 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.13, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted. (CVE-2016-8657) * It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. (CVE-2017-6056) * It was found that GZIPInterceptor is enabled when not necessarily required in RESTEasy. An attacker could use this flaw to launch a Denial of Service attack. (CVE-2016-6346) Red Hat would like to thank Mikhail Egorov (Odin) for reporting the CVE-2016-6346 issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id97932
    published2017-03-24
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97932
    titleRHEL 5 : JBoss EAP (RHSA-2017:0826)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-0829.NASL
    descriptionAn update for jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2). With this update, the jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 6.4.14. Security Fix(es) : * It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted. (CVE-2016-8657) * It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. (CVE-2017-6056) * It was found that GZIPInterceptor is enabled when not necessarily required in RESTEasy. An attacker could use this flaw to launch a Denial of Service attack. (CVE-2016-6346) Red Hat would like to thank Mikhail Egorov (Odin) for reporting the CVE-2016-6346 issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id97909
    published2017-03-23
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97909
    titleRHEL 6 : jboss-ec2-eap (RHSA-2017:0829)

Redhat

advisories
  • rhsa
    idRHSA-2017:0517
  • rhsa
    idRHSA-2017:0826
  • rhsa
    idRHSA-2017:0827
  • rhsa
    idRHSA-2017:0828
  • rhsa
    idRHSA-2017:0829
rpms
  • apache-cxf-0:2.7.18-6.SP5_redhat_1.1.ep6.el5
  • hornetq-0:2.3.25-19.SP17_redhat_1.1.ep6.el5
  • infinispan-0:5.2.21-1.Final_redhat_1.1.ep6.el5
  • infinispan-cachestore-jdbc-0:5.2.21-1.Final_redhat_1.1.ep6.el5
  • infinispan-cachestore-remote-0:5.2.21-1.Final_redhat_1.1.ep6.el5
  • infinispan-client-hotrod-0:5.2.21-1.Final_redhat_1.1.ep6.el5
  • infinispan-core-0:5.2.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-appclient-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-cli-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-client-all-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-clustering-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-cmp-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-configadmin-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-connector-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-controller-client-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-core-security-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-deployment-repository-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-deployment-scanner-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-domain-http-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-domain-management-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-ee-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-ee-deployment-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-ejb3-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-embedded-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-host-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jacorb-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jaxr-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jaxrs-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jdr-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jmx-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jpa-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jsf-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jsr77-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-logging-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-mail-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-management-client-content-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-messaging-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-modcluster-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-naming-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-network-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-osgi-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-osgi-configadmin-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-osgi-service-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-picketlink-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-platform-mbean-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-pojo-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-process-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-protocol-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-remoting-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-sar-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-security-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-server-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-system-jmx-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-threads-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-transactions-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-version-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-web-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-webservices-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-weld-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-xts-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-modules-0:1.3.8-1.Final_redhat_1.1.ep6.el5
  • jboss-msc-0:1.1.7-1.SP1_redhat_1.1.ep6.el5
  • jboss-remoting3-0:3.3.9-1.Final_redhat_1.1.ep6.el5
  • jbossas-appclient-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-bundles-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-core-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-domain-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-javadocs-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-modules-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-product-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-standalone-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-welcome-content-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossts-1:4.17.39-1.Final_redhat_1.1.ep6.el5
  • jbossweb-0:7.5.21-2.Final_redhat_2.1.ep6.el5
  • picketbox-0:4.1.4-1.Final_redhat_1.1.ep6.el5
  • resteasy-0:2.3.17-1.Final_redhat_1.1.ep6.el5
  • weld-core-0:1.1.34-1.Final_redhat_1.1.ep6.el5
  • apache-cxf-0:2.7.18-6.SP5_redhat_1.1.ep6.el6
  • hornetq-0:2.3.25-19.SP17_redhat_1.1.ep6.el6
  • infinispan-0:5.2.21-1.Final_redhat_1.1.ep6.el6
  • infinispan-cachestore-jdbc-0:5.2.21-1.Final_redhat_1.1.ep6.el6
  • infinispan-cachestore-remote-0:5.2.21-1.Final_redhat_1.1.ep6.el6
  • infinispan-client-hotrod-0:5.2.21-1.Final_redhat_1.1.ep6.el6
  • infinispan-core-0:5.2.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-appclient-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-cli-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-client-all-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-clustering-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-cmp-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-configadmin-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-connector-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-controller-client-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-core-security-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-deployment-repository-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-deployment-scanner-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-domain-http-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-domain-management-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-ee-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-ee-deployment-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-ejb3-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-embedded-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-host-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jacorb-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jaxr-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jaxrs-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jdr-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jmx-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jpa-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jsf-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jsr77-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-logging-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-mail-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-management-client-content-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-messaging-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-modcluster-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-naming-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-network-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-osgi-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-osgi-configadmin-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-osgi-service-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-picketlink-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-platform-mbean-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-pojo-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-process-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-protocol-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-remoting-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-sar-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-security-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-server-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-system-jmx-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-threads-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-transactions-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-version-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-web-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-webservices-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-weld-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-xts-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-modules-0:1.3.8-1.Final_redhat_1.1.ep6.el6
  • jboss-msc-0:1.1.7-1.SP1_redhat_1.1.ep6.el6
  • jboss-remoting3-0:3.3.9-1.Final_redhat_1.1.ep6.el6
  • jbossas-appclient-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-bundles-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-core-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-domain-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-javadocs-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-modules-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-product-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-standalone-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-welcome-content-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossts-1:4.17.39-1.Final_redhat_1.1.ep6.el6
  • jbossweb-0:7.5.21-2.Final_redhat_2.1.ep6.el6
  • picketbox-0:4.1.4-1.Final_redhat_1.1.ep6.el6
  • resteasy-0:2.3.17-1.Final_redhat_1.1.ep6.el6
  • weld-core-0:1.1.34-1.Final_redhat_1.1.ep6.el6
  • apache-cxf-0:2.7.18-6.SP5_redhat_1.1.ep6.el7
  • hornetq-0:2.3.25-19.SP17_redhat_1.1.ep6.el7
  • infinispan-0:5.2.21-1.Final_redhat_1.1.ep6.el7
  • infinispan-cachestore-jdbc-0:5.2.21-1.Final_redhat_1.1.ep6.el7
  • infinispan-cachestore-remote-0:5.2.21-1.Final_redhat_1.1.ep6.el7
  • infinispan-client-hotrod-0:5.2.21-1.Final_redhat_1.1.ep6.el7
  • infinispan-core-0:5.2.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-appclient-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-cli-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-client-all-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-clustering-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-cmp-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-configadmin-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-connector-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-controller-client-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-core-security-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-deployment-repository-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-deployment-scanner-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-domain-http-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-domain-management-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-ee-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-ee-deployment-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-ejb3-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-embedded-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-host-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jacorb-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jaxr-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jaxrs-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jdr-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jmx-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jpa-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jsf-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jsr77-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-logging-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-mail-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-management-client-content-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-messaging-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-modcluster-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-naming-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-network-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-osgi-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-osgi-configadmin-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-osgi-service-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-picketlink-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-platform-mbean-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-pojo-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-process-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-protocol-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-remoting-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-sar-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-security-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-server-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-system-jmx-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-threads-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-transactions-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-version-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-web-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-webservices-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-weld-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-xts-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-modules-0:1.3.8-1.Final_redhat_1.1.ep6.el7
  • jboss-msc-0:1.1.7-1.SP1_redhat_1.1.ep6.el7
  • jboss-remoting3-0:3.3.9-1.Final_redhat_1.1.ep6.el7
  • jbossas-appclient-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-bundles-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-core-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-domain-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-javadocs-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-modules-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-product-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-standalone-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-welcome-content-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossts-1:4.17.39-1.Final_redhat_1.1.ep6.el7
  • jbossweb-0:7.5.21-2.Final_redhat_2.1.ep6.el7
  • picketbox-0:4.1.4-1.Final_redhat_1.1.ep6.el7
  • resteasy-0:2.3.17-1.Final_redhat_1.1.ep6.el7
  • weld-core-0:1.1.34-1.Final_redhat_1.1.ep6.el7
  • jboss-ec2-eap-0:7.5.14-2.Final_redhat_2.ep6.el6
  • jboss-ec2-eap-samples-0:7.5.14-2.Final_redhat_2.ep6.el6

References