| VID |
14209 |
| Severity |
40 |
| Port |
22 |
| Protocol |
TCP |
| Class |
LSC |
| Detailed Description |
The remote system has Red Hat JBoss Enterprise Application Platform 6.3.2 installed and no security patches applied. Arbitrary code execution via unrestricted deserialization in ReadOnlyAccessFilter of HTTP Invoker.
Note: This check solely relied on the JBoss RPM version of the remote system to assess this vulnerability, so this might be a false positive.
* References: https://access.redhat.com/errata/RHSA-2018:1607
* Platforms Affected: Red Hat Enterprise Linux Server (v. 6) |
| Recommendation |
Use the following link to update to the latest JBoss. https://access.redhat.com/errata/RHSA-2018:1607 |
| Related URL |
CVE-2017-12149 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|