CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-12624 Red Hat Update for JBoss Enterprise Application Platform 7.1.4 on RHEL 6 (RHSA-2018:2423)

2018年9月13日 6348点热度 0人点赞 0条评论

漏洞类别:RedHat

漏洞等级: 

漏洞信息

Red Hat JBoss Enterprise Application Platform is a platform for Javaapplications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.3, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

Security Fixes: guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service (CVE-2018-10237)
bouncycastle: flaw in the low-level interface to RSA key pair generator (CVE-2018-1000180)
cxf: Improper size validation in message attachment header for JAX-WS and JAX-RS services (CVE-2017-12624)
wildfly: wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (CVE-2018-10862)
cxf-core: apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* (CVE-2018-8039)

Affected Products:

JBoss Enterprise Application Platform 7.1 for RHEL 6 x86_64
JBoss Enterprise Application Platform 7.1 for RHEL 6 i386

漏洞危害

On successful exploitation it could allow an attacker to execute code.

解决方案

Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

Refer to Red Hat security advisory RHSA-2018:2423 to address this issue and obtain more information.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

RHSA-2018:2423: Red Hat Enterprise Linux

0daybank

标签: 暂无
最后更新:2018年9月19日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me