Lucene search

K
symantecSymantec Security ResponseSMNTC-102879
HistoryJan 26, 2018 - 12:00 a.m.

Apache POI CVE-2017-12626 Multiple Denial of Service Vulnerabilities

2018-01-2600:00:00
Symantec Security Response
www.symantec.com
26

Description

Apache POI is prone to multiple denial-of-service vulnerabilities. An attacker may exploit these issues to cause a denial-of-service condition, denying service to legitimate users. Versions prior to POI 3.17 are vulnerable.

Technologies Affected

  • Apache POI 0.1
  • Apache POI 0.10.0
  • Apache POI 0.11.0
  • Apache POI 0.12.0
  • Apache POI 0.13.0
  • Apache POI 0.14.0
  • Apache POI 0.2
  • Apache POI 0.3
  • Apache POI 0.4
  • Apache POI 0.5
  • Apache POI 0.6
  • Apache POI 0.7
  • Apache POI 1.0.0
  • Apache POI 1.0.1
  • Apache POI 1.0.2
  • Apache POI 1.1.0
  • Apache POI 1.2.0
  • Apache POI 1.5
  • Apache POI 1.5.1
  • Apache POI 2.0
  • Apache POI 2.5
  • Apache POI 2.5.1
  • Apache POI 3.0
  • Apache POI 3.0.2
  • Apache POI 3.1
  • Apache POI 3.10.1
  • Apache POI 3.13
  • Apache POI 3.14
  • Apache POI 3.15
  • Apache POI 3.16
  • Apache POI 3.2
  • Apache POI 3.5
  • Apache POI 3.6
  • Apache POI 3.7
  • Apache POI 3.8
  • Apache POI 3.9
  • Oracle Enterprise Repository 12.1.3.0.0
  • Oracle Instantis EnterpriseTrack 17.1
  • Oracle Instantis EnterpriseTrack 17.2
  • Oracle Instantis EnterpriseTrack 17.3
  • Oracle Primavera Gateway 17.12
  • Oracle Primavera P6 Enterprise Project Portfolio Management 15.1
  • Oracle Primavera P6 Enterprise Project Portfolio Management 15.2
  • Oracle Primavera P6 Enterprise Project Portfolio Management 15.2.18
  • Oracle Primavera P6 Enterprise Project Portfolio Management 16.1
  • Oracle Primavera P6 Enterprise Project Portfolio Management 16.2
  • Oracle Primavera P6 Enterprise Project Portfolio Management 16.2.18
  • Oracle Primavera P6 Enterprise Project Portfolio Management 17.1
  • Oracle Primavera P6 Enterprise Project Portfolio Management 17.12
  • Oracle Primavera P6 Enterprise Project Portfolio Management 17.12.12
  • Oracle Primavera P6 Enterprise Project Portfolio Management 17.12.14
  • Oracle Primavera P6 Enterprise Project Portfolio Management 18.1.0
  • Oracle Primavera P6 Enterprise Project Portfolio Management 18.8
  • Oracle Primavera P6 Enterprise Project Portfolio Management 18.8.11
  • Oracle Primavera P6 Enterprise Project Portfolio Management 18.8.13
  • Oracle Primavera Unifier 16.1
  • Oracle Primavera Unifier 16.2
  • Oracle Primavera Unifier 17.12
  • Oracle Primavera Unifier 17.7
  • Oracle Primavera Unifier 18.8
  • Redhat JBoss Middleware Text-Only Advisories for MIDDLEWARE 1

Recommendations

Block external access at the network boundary, unless external parties require service.
If global access isn’t needed, filter access to the affected computer at the network boundary. Restricting access to only trusted computers and networks might greatly reduce the likelihood of successful exploits.

Run all software as a nonprivileged user with minimal access rights.
To limit the potential damage that a successful exploit may achieve, run all nonadministrative software as a regular user with the least amount of privileges required to successfully operate.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity including unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits.

Updates are available. Please see the references or vendor advisory for more information.