Oracle Enterprise Manager Cloud Control (January 2019 CPU)

critical Nessus Plugin ID 121225

Synopsis

An enterprise management application installed on the remote host is affected by remote code execution and denial of service attacks.

Description

The version of Oracle Enterprise Manager Cloud Control installed on the remote host is affected by multiple vulnerabilities in Enterprise Manager Base Platform component:

- A remote code execution vulnerability exists in Jython before 2.7.1rc1.
An unauthenticated, remote attacker can exploit this by sending a serialized function to the deserializer.
(CVE-2016-4000)

- A denial of service (DoS) vulnerability exists in OpenSSL due to the client spending long periods of time generating a key from large prime values. A malicious remote server can exploit this issue via sending a very large prime value to the clients, resulting in a hang until the client has finished generating the key.
(CVE-2018-0732)

Solution

Apply the appropriate patch according to the January 2019 Oracle Critical Patch Update advisory.

See Also

http://www.nessus.org/u?799b2d05

http://www.nessus.org/u?2407cfcd

Plugin Details

Severity: Critical

ID: 121225

File Name: oracle_enterprise_manager_jan_2019_cpu.nasl

Version: 1.7

Type: local

Agent: windows, macosx, unix

Family: Misc.

Published: 1/17/2019

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2016-4000

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:enterprise_manager

Required KB Items: installed_sw/Oracle Enterprise Manager Cloud Control

Exploit Ease: No known exploits are available

Patch Publication Date: 1/15/2019

Vulnerability Publication Date: 1/15/2019

Reference Information

CVE: CVE-2016-4000, CVE-2018-0732, CVE-2018-0737, CVE-2018-3303

BID: 103766, 104442, 105647, 106618

IAVA: 2020-A-0017