RHEL 6 : JBoss EAP (RHSA-2015:2542)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated jboss-ec2-eap packages that fix two security issues, several
bugs, and add various enhancements are now available for Red Hat JBoss
Enterprise Application Platform 6.4.4 on Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.

It was found that the Apache commons-collections library permitted
code execution when deserializing objects involving a specially
constructed chain of classes. A remote attacker could use this flaw to
execute arbitrary code with the permissions of the application using
the commons-collections library. (CVE-2015-7501)

Further information about the commons-collections flaw may be found
at: https://access.redhat.com/solutions/2045023

It was found that JBoss EAP did not properly authorize a user
performing a shut down. A remote user with the Monitor, Deployer, or
Auditor role could use this flaw to shut down the EAP server, which is
an action restricted to admin users. (CVE-2015-5304)

The CVE-2015-5304 issue was discovered by Ladislav Thon of Red Hat
Middleware Quality Engineering.

The jboss-ec2-eap packages provide scripts for Red Hat JBoss
Enterprise Application Platform running on the Amazon Web Services
(AWS) Elastic Compute Cloud (EC2). With this update, the packages have
been updated to ensure compatibility with Red Hat JBoss Enterprise
Application Platform 6.4.5. Documentation for these changes is
available from the link in the References section.

All jboss-ec2-eap users of Red Hat JBoss Enterprise Application
Platform 6.4 on Red Hat Enterprise Linux 6 are advised to upgrade to
these updated packages. The JBoss server process must be restarted for
the update to take effect.

See also :

https://www.redhat.com/security/data/cve/CVE-2015-5304.html
https://www.redhat.com/security/data/cve/CVE-2015-7501.html
https://access.redhat.com/documentation/en-US/
http://rhn.redhat.com/errata/RHSA-2015-2542.html

Solution :

Update the affected jboss-ec2-eap and / or jboss-ec2-eap-samples
packages.

Risk factor :

Low / CVSS Base Score : 3.5
(CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P)
CVSS Temporal Score : 3.3
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 87194 ()

Bugtraq ID:

CVE ID: CVE-2015-5304
CVE-2015-7501

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now