Lucene search

K
symantecSymantec Security ResponseSMNTC-111564
HistorySep 27, 2019 - 12:00 a.m.

FasterXML Jackson-databind CVE-2019-16943 Remote Code Execution Vulnerability

2019-09-2700:00:00
Symantec Security Response
www.symantec.com
94

Description

FasterXML Jackson-databind is prone to a remote-code execution vulnerability. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application. Failed exploits will result in denial-of-service conditions. FasterXML jackson-databind version 2.0.0 through 2.9.10 are vulnerable.

Technologies Affected

  • Cisco Webex Teams
  • Cloud Foundry UAA 63.0
  • Cloud Foundry UAA 64.0
  • Cloud Foundry UAA 72.0
  • Cloud Foundry UAA 73.0.0
  • Cloud Foundry UAA 73.3.0
  • Cloud Foundry UAA 73.4.0
  • Cloud Foundry UAA 73.4.2
  • Cloud Foundry UAA 74.0.0
  • Cloud Foundry UAA 74.3.0
  • Cloud Foundry UAA 74.5.0
  • Cloud Foundry UAA 74.6.0
  • Cloud Foundry cf-deployment 0.35.0
  • Cloud Foundry cf-deployment 0.36.0
  • Cloud Foundry cf-deployment 10.0.0
  • Cloud Foundry cf-deployment 10.1.0
  • Cloud Foundry cf-deployment 11.0.0
  • Cloud Foundry cf-deployment 11.1.0
  • Cloud Foundry cf-deployment 12.2.0
  • Cloud Foundry cf-deployment 12.3.0
  • Cloud Foundry cf-deployment 12.4.0
  • Cloud Foundry cf-deployment 12.5.0
  • Cloud Foundry cf-deployment 12.6.0
  • FasterXML jackson-databind 2.0.0
  • FasterXML jackson-databind 2.3
  • FasterXML jackson-databind 2.4
  • FasterXML jackson-databind 2.5
  • FasterXML jackson-databind 2.6
  • FasterXML jackson-databind 2.6.7.1
  • FasterXML jackson-databind 2.7
  • FasterXML jackson-databind 2.7.9.1
  • FasterXML jackson-databind 2.7.9.3
  • FasterXML jackson-databind 2.7.9.4
  • FasterXML jackson-databind 2.8
  • FasterXML jackson-databind 2.8.10
  • FasterXML jackson-databind 2.8.11
  • FasterXML jackson-databind 2.8.11.1
  • FasterXML jackson-databind 2.8.11.2
  • FasterXML jackson-databind 2.8.7
  • FasterXML jackson-databind 2.8.8
  • FasterXML jackson-databind 2.8.8.1
  • FasterXML jackson-databind 2.8.9
  • FasterXML jackson-databind 2.9.0
  • FasterXML jackson-databind 2.9.1
  • FasterXML jackson-databind 2.9.10
  • FasterXML jackson-databind 2.9.2
  • FasterXML jackson-databind 2.9.3
  • FasterXML jackson-databind 2.9.4
  • FasterXML jackson-databind 2.9.5
  • FasterXML jackson-databind 2.9.6
  • FasterXML jackson-databind 2.9.7
  • FasterXML jackson-databind 2.9.8
  • FasterXML jackson-databind 2.9.9
  • NetApp Active IQ Unified Manager for Linux 7.3
  • NetApp Active IQ Unified Manager for VMware vSphere 9.5
  • NetApp Active IQ Unified Manager for Windows 7.3
  • NetApp OnCommand Workflow Automation
  • NetApp Service Level Manager
  • Oracle JD Edwards EnterpriseOne Orchestrator 9.2
  • Oracle JD Edwards EnterpriseOne Tools 9.2
  • Redhat Descision Manager 7
  • Redhat Enterprise Linux 8
  • Redhat JBoss A-MQ 6.0
  • Redhat JBoss A-MQ Streaming
  • Redhat JBoss Data Grid 7
  • Redhat JBoss Data Virtualization 6.0.0
  • Redhat JBoss Enterprise Application Platform 7.0
  • Redhat JBoss Fuse 6.0
  • Redhat JBoss Fuse 7.0
  • Redhat Jboss Bpm Suite 6.0.0
  • Redhat Mobile Application Platform 4
  • Redhat OpenShift Container Platform 3.10
  • Redhat OpenShift Container Platform 3.11
  • Redhat OpenShift Container Platform 3.9
  • Redhat OpenShift Container Platform 4.1
  • Redhat OpenShift Container Platform 4.2
  • Redhat OpenStack Platform 10
  • Redhat OpenStack Platform 13
  • Redhat OpenStack Platform 14
  • Redhat Openshift Application Runtimes
  • Redhat Process Automation 7
  • Redhat Single Sign-On 7.0
  • Redhat Software Collections

Recommendations

Block external access at the network boundary, unless external parties require service.
If possible, block access to the server at the network perimeter. Allow only trusted computers and networks to have access to the resources.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor the network for suspicious requests. This may help detect attacks that try to exploit These and similar vulnerabilities. Audit all applicable logs regularly.

Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of a successful exploit, run the hosting webserver in a chrooted or jailed environment with the minimal amount of privileges required for functionality.

Implement multiple redundant layers of security.
Various memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker’s ability to exploit this vulnerability to execute arbitrary code.

Updates are available. Please see the references or vendor advisory for more information.