Scientific Linux Security Update : jakarta-commons-collections on SL5.x i386/x86_64

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

It was found that the Apache commons-collections library permitted
code execution when deserializing objects involving a specially
constructed chain of classes. A remote attacker could use this flaw to
execute arbitrary code with the permissions of the application using
the commons- collections library. (CVE-2015-7501)

With this update, deserialization of certain classes in the commons-
collections library is no longer allowed. Applications that require
those classes to be deserialized can use the system property
'org.apache.commons.collections.enableUnsafeSerialization' to
re-enable their deserialization.

In the interim, the quickest way to resolve this specific
deserialization vulnerability is to remove the vulnerable class files
(InvokerTransformer, InstantiateFactory, and InstantiateTransformer)
in all commons-collections jar files. Any manual changes should be
tested to avoid unforseen complications.

All running applications using the commons-collections library must be
restarted for the update to take effect.

See also :

Solution :

Update the affected packages.

Risk factor :


Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 87587 ()

Bugtraq ID:

CVE ID: CVE-2015-7501

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now