RHEL 5 : JBoss EAP (RHSA-2017:0246)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

An update is now available for Red Hat JBoss Enterprise Application
Platform 6.4 for RHEL 5.

Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.

Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.

This release of Red Hat JBoss Enterprise Application Platform 6.4.13
serves as a replacement for Red Hat JBoss Enterprise Application
Platform 6.4.12, and includes bug fixes and enhancements, which are
documented in the Release Notes document linked to in the References.

Security Fix(es) :

* It was discovered that the jboss init script performed unsafe file
handling which could result in local privilege escalation.
(CVE-2016-8656)

* It was discovered that the code that parsed the HTTP request line
permitted invalid characters. This could be exploited, in conjunction
with a proxy that also permitted the invalid characters but with a
different interpretation, to inject data into the HTTP response. By
manipulating the HTTP response the attacker could poison a web-cache,
perform an XSS attack and/or obtain sensitive information from
requests other then their own. (CVE-2016-6816)

* An EAP feature to download server log files allows logs to be
available via GET requests making them vulnerable to cross-origin
attacks. An attacker could trigger the user's browser to request the
log files consuming enough resources that normal server functioning
could be impaired. (CVE-2016-8627)

* It was discovered that when configuring RBAC and marking information
as sensitive, users with a Monitor role are able to view the sensitive
information. (CVE-2016-7061)

The CVE-2016-8627 issue was discovered by Darran Lofthouse and Brian
Stansberry (Red Hat).

See also :

https://www.redhat.com/security/data/cve/CVE-2016-6816.html
https://www.redhat.com/security/data/cve/CVE-2016-7061.html
https://www.redhat.com/security/data/cve/CVE-2016-8627.html
https://www.redhat.com/security/data/cve/CVE-2016-8656.html
https://access.redhat.com/documentation/en-US/
http://rhn.redhat.com/errata/RHSA-2017-0246.html

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Red Hat Local Security Checks

Nessus Plugin ID: 97010 ()

Bugtraq ID:

CVE ID: CVE-2016-6816
CVE-2016-7061
CVE-2016-8627
CVE-2016-8656

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now