SB2017092625 - Red Hat JBoss Enterprise Application Platform 7 update for eap7-jboss-ec2-eap
Published: September 26, 2017 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2014-9970)
The vulnerability allows a local attacker to gain access to potentially sensitive information.The weakness exists due to a flaw in the Jasypt component. A local attacker can conduct a timing attack on password hash comparison and obtain passwords on the target system.
2) Information disclosure (CVE-ID: CVE-2015-6644)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Bouncy Castle in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to obtain sensitive information via a crafted application, aka internal bug 24106146.
3) Information disclosure (CVE-ID: CVE-2017-2582)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists in the StaxParserUtil class of the Picketlink feature due to improper parsing of Security Assertion Markup Language (SAML) messages. A remote attacker can send a specially crafted SAML request that submits malicious input and access sensitive information, such as values of system properties.
4) Deserialization of untrusted data (CVE-ID: CVE-2017-5645)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists receiving serialized log events from another application when using the TCP socket server or UDP socket server. A remote attacker can submit a specially crafted binary payload, when deserialized, and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
5) Privilege escalation (CVE-ID: CVE-2017-7536)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to the security manager's reflective permissions are granted to Hibernate Validator. A local attacker can allow the calling code to access private members without the permission, validate an invalid instance, access the private member value via ConstraintViolation#getInvalidValue() and gain execute arbitrary code with elevated privileges.
Remediation
Install update from vendor's website.