Oracle Enterprise Manager Cloud Control (January 2019 CPU)

High Nessus Plugin ID 121225

Synopsis

An enterprise management application installed on the remote host is affected by remote code execution and denial of service attacks.

Description

The version of Oracle Enterprise Manager Cloud Control installed on the remote host is affected by multiple vulnerabilities in Enterprise Manager Base Platform component:

- A remote code execution vulnerability exists in Jython before 2.7.1rc1.
An unauthenticated, remote attacker can exploit this by sending a serialized function to the deserializer.
(CVE-2016-4000)

- A denial of service (DoS) vulnerability exists in OpenSSL due to the client spending long periods of time generating a key from large prime values. A malicious remote server can exploit this issue via sending a very large prime value to the clients, resulting in a hang until the client has finished generating the key.
(CVE-2018-0732)

Solution

Apply the appropriate patch according to the January 2019 Oracle Critical Patch Update advisory.

See Also

http://www.nessus.org/u?799b2d05

http://www.nessus.org/u?2407cfcd

Plugin Details

Severity: High

ID: 121225

File Name: oracle_enterprise_manager_jan_2019_cpu.nasl

Version: 1.3

Type: local

Family: Misc.

Published: 2019/01/17

Updated: 2019/04/18

Dependencies: 80965

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2016-4000

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:oracle:enterprise_manager

Patch Publication Date: 2019/01/15

Vulnerability Publication Date: 2019/01/15

Reference Information

CVE: CVE-2016-4000, CVE-2018-0732, CVE-2018-0737, CVE-2018-3303

BID: 105647, 104442, 103766, 106618