SB2021072820 - Multiple vulnerabilities in Siebel Core - Server Framework
Published: July 28, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2021-2353)
The vulnerability allows a local privileged user to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Loging component in Siebel Core - Server Framework. A local privileged user can exploit this vulnerability to gain access to sensitive information.
2) Improper access control (CVE-ID: CVE-2017-5637)
The vulnerability allows a local user to perform a denial of service attack.The vulnerability exists due to improper access constrictions to wchp/wchc service. A local user can consume all available CPU resource and perform denial of service (DoS) attack.
3) Deserialization of Untrusted Data (CVE-ID: CVE-2020-24750)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration. A remote attacker can execute arbitrary code on the target system.
Remediation
Install update from vendor's website.