Oracle Secure Global Desktop Multiple Vulnerabilities (July 2018 CPU)
High Nessus Plugin ID 111333
SynopsisAn application installed on the remote host is affected by multiple
DescriptionThe version of Oracle Secure Global Desktop installed on the remote
host is 5.3 and is missing a security patch from the July 2018
Critical Patch Update (CPU). It is, therefore, affected by multiple
- curl version curl 7.54.1 to and including curl 7.59.0 contains a
Heap-based Buffer Overflow vulnerability in FTP connection closing
down functionality which can lead to DoS and RCE conditions. This
vulnerability appears to have been fixed in curl < 7.54.1 and
curl >= 7.60.0. (CVE-2018-1000300)
- Security constraints defined by annotations of Servlets in Apache
Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and
7.0.0 to 7.0.84 were only applied once a Servlet had been loaded.
It was possible - depending on the order Servlets were loaded - for
some security constraints not to be applied. This could have exposed
resources to unauthorized users. (CVE-2018-1305)
- ASN.1 types with a recursive definition could exceed the stack
given malicious input with excessive recursion. This could result
in a Denial Of Service attack. Fixed in OpenSSL 1.1.0h (Affected
1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
SolutionApply the appropriate patch according to the July 2018 Oracle
Critical Patch Update advisory.