Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-12103

Опубликовано: 09 фев. 2023
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2023-12103: hsqldb security update (IMPORTANT)

[1:1.8.0.10-12.0.1]

  • Fix possible remote code execution vulnerability [CVE-2022-41853][Orabug: 34820687]

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

hsqldb

1.8.0.10-12.0.1.el6

hsqldb-demo

1.8.0.10-12.0.1.el6

hsqldb-javadoc

1.8.0.10-12.0.1.el6

hsqldb-manual

1.8.0.10-12.0.1.el6

Oracle Linux i686

hsqldb

1.8.0.10-12.0.1.el6

hsqldb-demo

1.8.0.10-12.0.1.el6

hsqldb-javadoc

1.8.0.10-12.0.1.el6

hsqldb-manual

1.8.0.10-12.0.1.el6

Связанные CVE

Связанные уязвимости

CVSS3: 8
ubuntu
почти 3 года назад

Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.

CVSS3: 9.8
redhat
почти 3 года назад

Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.

CVSS3: 8
nvd
почти 3 года назад

Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.

CVSS3: 8
debian
почти 3 года назад

Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb ...

suse-cvrf
почти 3 года назад

Security update for hsqldb