Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-9585

Опубликовано: 14 дек. 2016
Источник: redhat
CVSS3: 5.3
CVSS2: 2.6
EPSS Низкий

Описание

Red Hat JBoss EAP version 5 is vulnerable to a deserialization of untrusted data in the JMX endpoint when deserializes the credentials passed to it. An attacker could exploit this vulnerability resulting in a denial of service attack.

It was found that the JMX endpoint of Red Hat JBoss EAP 5 deserializes the credentials passed to it. An attacker could use this flaw to cause a denial of service.

Меры по смягчению последствий

You should not expose Remote JMX on EAP 5, or SOA-P 5. To do that remove this system property from bin/run.conf, or bin/run.conf.bat: com.sun.management.jmxremote.port=

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 5jbossasWill not fix
Red Hat JBoss SOA Platform 5jbossasWill not fix

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1404528EAP-5: unsafe deserialization of user credentials by the JMX endpoint

EPSS

Процентиль: 40%
0.00181
Низкий

5.3 Medium

CVSS3

2.6 Low

CVSS2

Связанные уязвимости

CVSS3: 5.3
nvd
почти 8 лет назад

Red Hat JBoss EAP version 5 is vulnerable to a deserialization of untrusted data in the JMX endpoint when deserializes the credentials passed to it. An attacker could exploit this vulnerability resulting in a denial of service attack.

CVSS3: 5.3
github
больше 3 лет назад

Red Hat JBoss EAP version 5 is vulnerable to a deserialization of untrusted data in the JMX endpoint when deserializes the credentials passed to it. An attacker could exploit this vulnerability resulting in a denial of service attack.

EPSS

Процентиль: 40%
0.00181
Низкий

5.3 Medium

CVSS3

2.6 Low

CVSS2