SB2017092625 - Red Hat JBoss Enterprise Application Platform 7 update for eap7-jboss-ec2-eap



SB2017092625 - Red Hat JBoss Enterprise Application Platform 7 update for eap7-jboss-ec2-eap

Published: September 26, 2017 Updated: April 24, 2025

Security Bulletin ID SB2017092625
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 20% Low 80%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2014-9970)

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The weakness exists due to a flaw in the Jasypt component. A local attacker can conduct a timing attack on password hash comparison and obtain passwords on the target system.

2) Information disclosure (CVE-ID: CVE-2015-6644)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

Bouncy Castle in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to obtain sensitive information via a crafted application, aka internal bug 24106146.


3) Information disclosure (CVE-ID: CVE-2017-2582)

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists in the StaxParserUtil class of the Picketlink feature due to improper parsing of Security Assertion Markup Language (SAML) messages. A remote attacker can send a specially crafted SAML request that submits malicious input and access sensitive information, such as values of system properties.


4) Deserialization of untrusted data (CVE-ID: CVE-2017-5645)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists receiving serialized log events from another application when using the TCP socket server or UDP socket server. A remote attacker can submit a specially crafted binary payload, when deserialized, and execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

5) Privilege escalation (CVE-ID: CVE-2017-7536)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to the security manager's reflective permissions are granted to Hibernate Validator. A local attacker can allow the calling code to access private members without the permission, validate an invalid instance, access the private member value via ConstraintViolation#getInvalidValue() and gain execute arbitrary code with elevated privileges.

Remediation

Install update from vendor's website.