Lucene search

K
redhatRedHatRHSA-2018:0479
HistoryMar 12, 2018 - 4:34 p.m.

(RHSA-2018:0479) Important: JBoss Enterprise Application Platform 7.1.1 on RHEL 6

2018-03-1216:34:40
access.redhat.com
88

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.571 Medium

EPSS

Percentile

97.7%

Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.

This release of Red Hat JBoss Enterprise Application Platform 7.1.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

Security Fix(es):

  • artemis/hornetq: memory exhaustion via UDP and JGroups discovery (CVE-2017-12174)

  • infinispan: Unsafe deserialization of malicious object injected into data cache (CVE-2017-15089)

  • jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) (CVE-2017-15095)

  • jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) (CVE-2017-17485)

  • resteasy: Vary header not added by CORS filter leading to cache poisoning (CVE-2017-7561)

  • undertow: Client can use bogus uri in Digest authentication (CVE-2017-12196)

  • undertow: ALLOW_ENCODED_SLASH option not taken into account in the AjpRequestParser (CVE-2018-1048)

  • jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485) (CVE-2018-5968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

OSVersionArchitecturePackageVersionFilename
RedHat6noarcheap7-resteasy-jettison-provider< 3.0.25-1.Final_redhat_1.1.ep7.el6eap7-resteasy-jettison-provider-3.0.25-1.Final_redhat_1.1.ep7.el6.noarch.rpm
RedHat6noarcheap7-resteasy-jaxb-provider< 3.0.25-1.Final_redhat_1.1.ep7.el6eap7-resteasy-jaxb-provider-3.0.25-1.Final_redhat_1.1.ep7.el6.noarch.rpm
RedHat6noarcheap7-hibernate-java8< 5.1.12-1.Final_redhat_1.1.ep7.el6eap7-hibernate-java8-5.1.12-1.Final_redhat_1.1.ep7.el6.noarch.rpm
RedHat6noarcheap7-narayana-txframework< 5.5.31-1.Final_redhat_1.1.ep7.el6eap7-narayana-txframework-5.5.31-1.Final_redhat_1.1.ep7.el6.noarch.rpm
RedHat6noarcheap7-picketlink-config< 2.5.5-10.SP9_redhat_1.1.ep7.el6eap7-picketlink-config-2.5.5-10.SP9_redhat_1.1.ep7.el6.noarch.rpm
RedHat6noarcheap7-wildfly-javadocs< 7.1.1-3.GA_redhat_2.1.ep7.el6eap7-wildfly-javadocs-7.1.1-3.GA_redhat_2.1.ep7.el6.noarch.rpm
RedHat6noarcheap7-jboss-server-migration-wildfly10.1< 1.0.3-6.Final_redhat_6.1.ep7.el6eap7-jboss-server-migration-wildfly10.1-1.0.3-6.Final_redhat_6.1.ep7.el6.noarch.rpm
RedHat6noarcheap7-activemq-artemis-jms-client< 1.5.5.009-1.redhat_1.1.ep7.el6eap7-activemq-artemis-jms-client-1.5.5.009-1.redhat_1.1.ep7.el6.noarch.rpm
RedHat6noarcheap7-jackson-jaxrs-json-provider< 2.8.11-1.redhat_1.1.ep7.el6eap7-jackson-jaxrs-json-provider-2.8.11-1.redhat_1.1.ep7.el6.noarch.rpm
RedHat6noarcheap7-jboss-server-migration-wildfly10.1-to-eap7.1< 1.0.3-6.Final_redhat_6.1.ep7.el6eap7-jboss-server-migration-wildfly10.1-to-eap7.1-1.0.3-6.Final_redhat_6.1.ep7.el6.noarch.rpm
Rows per page:
1-10 of 1281

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.571 Medium

EPSS

Percentile

97.7%