Oracle GlassFish Server 3.0.1.x < 3.0.1.14 Multiple Vulnerabilities (July 2016 CPU)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote web server is affected by multiple vulnerabilities.

Description :

According to its self-reported version number, the Oracle GlassFish
Server running on the remote host is 3.0.1.x prior to 3.0.1.14. It is,
therefore, affected by multiple vulnerabilities :

- An information disclosure vulnerability exists in the
bundled version of libcurl in the smb_request_state()
function due to using values that are assumed valid
without properly checking boundaries. An
unauthenticated, remote attacker can exploit this, via a
malicious SMB server, to disclose arbitrary memory
contents. (CVE-2015-3237)

- An unspecified flaw exists in the Web Container
subcomponent that allows an unauthenticated, remote
attacker to execute arbitrary code. (CVE-2016-3607)

- Multiple unspecified flaws exist in the Administration
subcomponent that allows an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2016-3608, CVE-2016-5477)

See also :

http://www.nessus.org/u?453b5f8c

Solution :

Upgrade to Oracle GlassFish Server version 3.0.1.14 or later as
referenced in the July 2016 Oracle Critical Patch Update advisory.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 92463 ()

Bugtraq ID: 75387
92031
92032

CVE ID: CVE-2015-3237
CVE-2016-3607
CVE-2016-3608
CVE-2016-5477

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now