RHEL 6 : jboss-ec2-eap (RHSA-2016:2072)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

An update for jboss-ec2-eap is now available for Red Hat JBoss
Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security
impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.

Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
EE applications. It is based on JBoss Application Server 7 and
incorporates multiple open-source projects to provide a complete Java
EE platform solution.

Security Fix(es) :

* A denial of service vulnerability was identified in Commons
FileUpload that occurred when the length of the multipart boundary was
just below the size of the buffer (4096 bytes) used to read the
uploaded file if the boundary was the typical tens of bytes long.
(CVE-2016-3092)

Enhancement(s) :

* The jboss-ec2-eap packages provide scripts for Red Hat JBoss
Enterprise Application Platform running on the Amazon Web Services
(AWS) Elastic Compute Cloud (EC2). With this update, the packages have
been updated to ensure compatibility with Red Hat JBoss Enterprise
Application Platform 6.4.11.

Users of EAP 6.4.10 jboss-ec2-eap are advised to upgrade to these
updated packages, which add this enhancement.

See also :

https://www.redhat.com/security/data/cve/CVE-2016-3092.html
https://access.redhat.com/documentation/en-US/
http://rhn.redhat.com/errata/RHSA-2016-2072.html

Solution :

Update the affected jboss-ec2-eap and / or jboss-ec2-eap-samples
packages.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 94104 ()

Bugtraq ID:

CVE ID: CVE-2016-3092

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now