![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.62861 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Security Advisory RHSA-2006:0743 |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing updates announced in advisory RHSA-2006:0743. JBoss Application Server is a J2EE certified platform for developing and deploying enterprise Java applications, Web applications, and Portals. Symantec discovered a flaw in the DeploymentFileRepository class of the JBoss Application Server. A remote attacker who is able to access the console manager could read or write to files with the permissions of the JBoss user. This could potentially lead to arbitrary code execution as the jboss user. (CVE-2006-5750) For the Red Hat Application Stack, the jbossas service is not enabled by default. Once the jbossas service is enabled, the console manager will become accessible on port 8080. Although port 8080 will be blocked from outside access by the default Red Hat Enterprise Linux firewall rules, users should ensure that the console is not available publicly and is adequately protected by authentication as explained in the JBoss documentation. A correct configuration of the JBoss Application Server would mitigate this vulnerability to only being exploitable by users who have authorization to use the console manager. All users of Red Hat Application Stack are advised to upgrade to these updated packages, which resolve the directory traversal issue with a backported patch. These updated packages also contain a change to the default jbossas configuration file. For users installing Red Hat Application Stack for the first time, all JBoss Application Server network services, including the management consoles, will be restricted by default to localhost. No change is made for users upgrading previously installed jbossas packages. Users who already have Red Hat Application Stack installed should check to make sure that they have correctly followed the security guidelines and that the management consoles are not accessible to unauthorized users. Red Hat would like to thank Symantec for reporting this issue. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2006-0743.html http://kbase.redhat.com/faq/FAQ_107_9629.shtm http://www.redhat.com/security/updates/classification/#critical Risk factor : High CVSS Score: 7.5 |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2006-5750 1017289 http://securitytracker.com/id?1017289 20061127 SYMSA-2006-011: JBoss Java Class DeploymentFileRepository Directory Traversal http://www.securityfocus.com/archive/1/452830/100/0/threaded 20061128 Re: SYMSA-2006-011: JBoss Java Class DeploymentFileRepository Directory Traversal http://www.securityfocus.com/archive/1/452862/100/100/threaded 21219 http://www.securityfocus.com/bid/21219 23095 http://secunia.com/advisories/23095 23984 http://secunia.com/advisories/23984 24104 http://secunia.com/advisories/24104 29726 http://secunia.com/advisories/29726 30767 http://www.osvdb.org/30767 ADV-2006-4724 http://www.vupen.com/english/advisories/2006/4724 ADV-2006-4726 http://www.vupen.com/english/advisories/2006/4726 ADV-2007-0554 http://www.vupen.com/english/advisories/2007/0554 ADV-2008-1155 http://www.vupen.com/english/advisories/2008/1155/references HPSBST02318 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402 RHSA-2006:0743 http://www.redhat.com/support/errata/RHSA-2006-0743.html SSRT080018 SUSE-SR:2007:002 http://www.novell.com/linux/security/advisories/2007_02_sr.html http://jira.jboss.com/jira/browse/ASPATCH-126 http://jira.jboss.com/jira/browse/JBAS-3861 https://secure-support.novell.com/KanisaPlatform/Publishing/719/3024921_f.SAL_Public.html |
Copyright | Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |