RHEL 6 : Red Hat Single Sign-On 7.1 update on RHEL 6 (Moderate) (RHSA-2017:0872)

medium Nessus Plugin ID 117313

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2017:0872 advisory.

- keycloak: user deletion via incorrect permissions check (CVE-2016-8629)

- wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage (CVE-2016-9589)

- keycloak: timing attack in JWS signature verification (CVE-2017-2585)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?813f1fff

http://www.nessus.org/u?b0187894

https://access.redhat.com/errata/RHSA-2017:0872

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=1388988

https://bugzilla.redhat.com/show_bug.cgi?id=1404782

https://bugzilla.redhat.com/show_bug.cgi?id=1412376

https://issues.redhat.com/browse/RHSSO-427

Plugin Details

Severity: Medium

ID: 117313

File Name: redhat-RHSA-2017-0872.nasl

Version: 1.6

Type: local

Agent: unix

Published: 9/6/2018

Updated: 4/24/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P

CVSS Score Source: CVE-2016-8629

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:rh-sso7, p-cpe:/a:redhat:enterprise_linux:rh-sso7-freemarker, p-cpe:/a:redhat:enterprise_linux:rh-sso7-javapackages-tools, p-cpe:/a:redhat:enterprise_linux:rh-sso7-keycloak, p-cpe:/a:redhat:enterprise_linux:rh-sso7-keycloak-server, p-cpe:/a:redhat:enterprise_linux:rh-sso7-libunix-dbus-java, p-cpe:/a:redhat:enterprise_linux:rh-sso7-libunix-dbus-java-devel, p-cpe:/a:redhat:enterprise_linux:rh-sso7-liquibase, p-cpe:/a:redhat:enterprise_linux:rh-sso7-liquibase-core, p-cpe:/a:redhat:enterprise_linux:rh-sso7-python-javapackages, p-cpe:/a:redhat:enterprise_linux:rh-sso7-runtime, p-cpe:/a:redhat:enterprise_linux:rh-sso7-twitter4j, p-cpe:/a:redhat:enterprise_linux:rh-sso7-twitter4j-core, p-cpe:/a:redhat:enterprise_linux:rh-sso7-zxing, p-cpe:/a:redhat:enterprise_linux:rh-sso7-zxing-core, p-cpe:/a:redhat:enterprise_linux:rh-sso7-zxing-javase, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 4/4/2017

Vulnerability Publication Date: 3/12/2018

Reference Information

CVE: CVE-2016-8629, CVE-2016-9589, CVE-2017-2585

CWE: 284, 385, 400

RHSA: 2017:0872