RHEL 6 : Red Hat JBoss Web Server 3.1.0 (RHSA-2017:0455)

critical Nessus Plugin ID 97595

Synopsis

The remote Red Hat host is missing one or more security updates for Red Hat JBoss Web Server 3.1.0.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2017:0455 advisory.

- tomcat: timing attack in Realm implementation (CVE-2016-0762)

- tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation (CVE-2016-1240)

- tomcat: Usage of vulnerable FileUpload package can result in denial of service (CVE-2016-3092)

- tomcat: security manager bypass via IntrospectHelper utility function (CVE-2016-5018)

- tomcat: tomcat writable config files allow privilege escalation (CVE-2016-6325)

- tomcat: system property disclosure (CVE-2016-6794)

- tomcat: security manager bypass via JSP Servlet config parameters (CVE-2016-6796)

- tomcat: unrestricted access to global resources (CVE-2016-6797)

- tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (CVE-2016-6816)

- tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener (CVE-2016-8735)

- tomcat: information disclosure due to incorrect Processor sharing (CVE-2016-8745)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL Red Hat JBoss Web Server 3.1.0 package based on the guidance in RHSA-2017:0455.

See Also

http://www.nessus.org/u?095e39a4

https://access.redhat.com/errata/RHSA-2017:0455

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1349468

https://bugzilla.redhat.com/show_bug.cgi?id=1367447

https://bugzilla.redhat.com/show_bug.cgi?id=1376712

https://bugzilla.redhat.com/show_bug.cgi?id=1390493

https://bugzilla.redhat.com/show_bug.cgi?id=1390515

https://bugzilla.redhat.com/show_bug.cgi?id=1390520

https://bugzilla.redhat.com/show_bug.cgi?id=1390525

https://bugzilla.redhat.com/show_bug.cgi?id=1390526

https://bugzilla.redhat.com/show_bug.cgi?id=1397484

https://bugzilla.redhat.com/show_bug.cgi?id=1397485

https://bugzilla.redhat.com/show_bug.cgi?id=1403824

https://issues.redhat.com/browse/JWS-267

Plugin Details

Severity: Critical

ID: 97595

File Name: redhat-RHSA-2017-0455.nasl

Version: 3.13

Type: local

Agent: unix

Published: 3/8/2017

Updated: 4/24/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2016-8735

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:hibernate4-c3p0-eap6, p-cpe:/a:redhat:enterprise_linux:hibernate4-core-eap6, p-cpe:/a:redhat:enterprise_linux:hibernate4-eap6, p-cpe:/a:redhat:enterprise_linux:hibernate4-entitymanager-eap6, p-cpe:/a:redhat:enterprise_linux:hibernate4-envers-eap6, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apache-commons-daemon, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apache-commons-daemon-jsvc, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-runtime, p-cpe:/a:redhat:enterprise_linux:mod_cluster, p-cpe:/a:redhat:enterprise_linux:mod_cluster-tomcat7, p-cpe:/a:redhat:enterprise_linux:mod_cluster-tomcat8, p-cpe:/a:redhat:enterprise_linux:tomcat-native, p-cpe:/a:redhat:enterprise_linux:tomcat-vault, p-cpe:/a:redhat:enterprise_linux:tomcat7, p-cpe:/a:redhat:enterprise_linux:tomcat7-admin-webapps, p-cpe:/a:redhat:enterprise_linux:tomcat7-docs-webapp, p-cpe:/a:redhat:enterprise_linux:tomcat7-el-2.2-api, p-cpe:/a:redhat:enterprise_linux:tomcat7-javadoc, p-cpe:/a:redhat:enterprise_linux:tomcat7-jsp-2.2-api, p-cpe:/a:redhat:enterprise_linux:tomcat7-jsvc, p-cpe:/a:redhat:enterprise_linux:tomcat7-lib, p-cpe:/a:redhat:enterprise_linux:tomcat7-log4j, p-cpe:/a:redhat:enterprise_linux:tomcat7-selinux, p-cpe:/a:redhat:enterprise_linux:tomcat7-servlet-3.0-api, p-cpe:/a:redhat:enterprise_linux:tomcat7-webapps, p-cpe:/a:redhat:enterprise_linux:tomcat8, p-cpe:/a:redhat:enterprise_linux:tomcat8-admin-webapps, p-cpe:/a:redhat:enterprise_linux:tomcat8-docs-webapp, p-cpe:/a:redhat:enterprise_linux:tomcat8-el-2.2-api, p-cpe:/a:redhat:enterprise_linux:tomcat8-javadoc, p-cpe:/a:redhat:enterprise_linux:tomcat8-jsp-2.3-api, p-cpe:/a:redhat:enterprise_linux:tomcat8-jsvc, p-cpe:/a:redhat:enterprise_linux:tomcat8-lib, p-cpe:/a:redhat:enterprise_linux:tomcat8-log4j, p-cpe:/a:redhat:enterprise_linux:tomcat8-selinux, p-cpe:/a:redhat:enterprise_linux:tomcat8-servlet-3.1-api, p-cpe:/a:redhat:enterprise_linux:tomcat8-webapps, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/7/2017

Vulnerability Publication Date: 7/4/2016

CISA Known Exploited Vulnerability Due Dates: 6/2/2023

Exploitable With

Metasploit (Apache Tomcat on Ubuntu Log Init Privilege Escalation)

Reference Information

CVE: CVE-2016-0762, CVE-2016-1240, CVE-2016-3092, CVE-2016-5018, CVE-2016-6325, CVE-2016-6794, CVE-2016-6796, CVE-2016-6797, CVE-2016-6816, CVE-2016-8735, CVE-2016-8745

CWE: 20, 284, 444, 502

RHSA: 2017:0455