ID

VAR-201704-1589


CVE

CVE-2017-5645


TITLE

Apache Log4j CVE-2017-5645 Remote Code Execution Vulnerability

Trust: 0.3

sources: BID: 97702

DESCRIPTION

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code. Apache Log4j is prone to remote code-execution vulnerability. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application. Failed exploits will result in denial-of-service conditions. Apache Log4j 2.0-alpha1 through 2.8.1 are vulnerable. Apache Log4j is a Java-based open source logging tool developed by the Apache Software Foundation. The References section of this erratum contains a download link (you must log in to download the update). Description: Red Hat JBoss BPM Suite is a business rules and processes management system for the management, storage, creation, modification, and deployment of JBoss rules and BPMN2-compliant business processes. (CVE-2017-5645) * It was found that XStream contains a vulnerability that allows a maliciously crafted file to be parsed successfully which could cause an application crash. The crash occurs if the file that is being fed into XStream input stream contains an instances of the primitive type 'void'. An attacker could use this flaw to create a denial of service on the target system. (CVE-2017-7957) 3. It is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: log4j security update Advisory ID: RHSA-2017:2423-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:2423 Issue date: 2017-08-07 CVE Names: CVE-2017-5645 ===================================================================== 1. Summary: An update for log4j is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch Red Hat Enterprise Linux Client Optional (v. 7) - noarch Red Hat Enterprise Linux ComputeNode (v. 7) - noarch Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Enterprise Linux Server Optional (v. 7) - noarch Red Hat Enterprise Linux Workstation (v. 7) - noarch Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch 3. Description: Log4j is a tool to help the programmer output log statements to a variety of output targets. (CVE-2017-5645) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1443635 - CVE-2017-5645 log4j: Socket receiver deserialization vulnerability 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: log4j-1.2.17-16.el7_4.src.rpm noarch: log4j-1.2.17-16.el7_4.noarch.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: log4j-javadoc-1.2.17-16.el7_4.noarch.rpm log4j-manual-1.2.17-16.el7_4.noarch.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: log4j-1.2.17-16.el7_4.src.rpm noarch: log4j-1.2.17-16.el7_4.noarch.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: log4j-javadoc-1.2.17-16.el7_4.noarch.rpm log4j-manual-1.2.17-16.el7_4.noarch.rpm Red Hat Enterprise Linux Server (v. 7): Source: log4j-1.2.17-16.el7_4.src.rpm noarch: log4j-1.2.17-16.el7_4.noarch.rpm Red Hat Enterprise Linux Server Optional (v. 7): noarch: log4j-javadoc-1.2.17-16.el7_4.noarch.rpm log4j-manual-1.2.17-16.el7_4.noarch.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: log4j-1.2.17-16.el7_4.src.rpm noarch: log4j-1.2.17-16.el7_4.noarch.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: log4j-javadoc-1.2.17-16.el7_4.noarch.rpm log4j-manual-1.2.17-16.el7_4.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFZiCjVXlSAg2UNWIIRAgugAKCX6snTYMAdTmkK1uQ86MGQhkv7ugCdFILV uCPrjfU5EG2L7kIu/w1uCSA= =Fxz+ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description: The eap7-jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2). Refer to the JBoss Enterprise Application Platform 7.0.8 Release Notes, linked to in the References section, for information on the most significant bug fixes and enhancements included in this release. (CVE-2017-5645) * A vulnerability was found in Jasypt that would allow an attacker to perform a timing attack on password hash comparison. (CVE-2014-9970) * It was found that an information disclosure flaw in Bouncy Castle could enable a local malicious application to gain access to user's private information. (CVE-2015-6644) * It was found that while parsing the SAML messages the StaxParserUtil class of Picketlink replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response. (CVE-2017-2582) * It was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue(). Bugs fixed (https://bugzilla.redhat.com/): 1410481 - CVE-2017-2582 picketlink, keycloak: SAML request parser replaces special strings with system properties 1443635 - CVE-2017-5645 log4j: Socket receiver deserialization vulnerability 1444015 - CVE-2015-6644 bouncycastle: Information disclosure in GCMBlockCipher 1455566 - CVE-2014-9970 jasypt: Vulnerable to timing attack against the password hash comparison 1465573 - CVE-2017-7536 hibernate-validator: Privilege escalation when running under the security manager 6. JIRA issues fixed (https://issues.jboss.org/): JBEAP-11487 - jboss-ec2-eap for EAP 7.0.8 7. (CVE-2017-5645) * A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-7525) Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525

Trust: 1.98

sources: NVD: CVE-2017-5645 // BID: 97702 // VULHUB: VHN-113848 // PACKETSTORM: 144347 // PACKETSTORM: 144358 // PACKETSTORM: 144597 // PACKETSTORM: 144019 // PACKETSTORM: 144360 // PACKETSTORM: 143670 // PACKETSTORM: 144359 // PACKETSTORM: 144018

AFFECTED PRODUCTS

vendor:oraclemodel:utilities advanced spatial and operational analyticsscope:eqversion:2.7.0.1

Trust: 1.3

vendor:oraclemodel:tape library acslsscope:eqversion:8.4

Trust: 1.3

vendor:oraclemodel:soa suitescope:eqversion:12.2.1.3.0

Trust: 1.3

vendor:oraclemodel:soa suitescope:eqversion:12.1.3.0.0

Trust: 1.3

vendor:oraclemodel:siebel ui frameworkscope:eqversion:18.9

Trust: 1.3

vendor:oraclemodel:siebel ui frameworkscope:eqversion:18.8

Trust: 1.3

vendor:oraclemodel:siebel ui frameworkscope:eqversion:18.7

Trust: 1.3

vendor:oraclemodel:retail open commerce platformscope:eqversion:6.0.1

Trust: 1.3

vendor:oraclemodel:retail extract transform and loadscope:eqversion:13.2

Trust: 1.3

vendor:oraclemodel:retail extract transform and loadscope:eqversion:13.1

Trust: 1.3

vendor:oraclemodel:retail extract transform and loadscope:eqversion:13.0

Trust: 1.3

vendor:oraclemodel:retail advanced inventory planningscope:eqversion:15.0

Trust: 1.3

vendor:oraclemodel:jdeveloperscope:eqversion:12.1.3.0.0

Trust: 1.3

vendor:oraclemodel:jdeveloperscope:eqversion:11.1.1.9.0

Trust: 1.3

vendor:oraclemodel:jd edwards enterpriseone toolsscope:eqversion:9.2

Trust: 1.3

vendor:oraclemodel:insurance rules palettescope:eqversion:11.1

Trust: 1.3

vendor:oraclemodel:insurance rules palettescope:eqversion:11.0

Trust: 1.3

vendor:oraclemodel:insurance rules palettescope:eqversion:10.1

Trust: 1.3

vendor:oraclemodel:insurance rules palettescope:eqversion:10.0

Trust: 1.3

vendor:oraclemodel:insurance calculation enginescope:eqversion:10.2.1

Trust: 1.3

vendor:oraclemodel:insurance calculation enginescope:eqversion:10.1.1

Trust: 1.3

vendor:oraclemodel:identity management suitescope:eqversion:12.2.1.3.0

Trust: 1.3

vendor:oraclemodel:identity management suitescope:eqversion:11.1.2.3.0

Trust: 1.3

vendor:oraclemodel:identity analyticsscope:eqversion:11.1.1.5.8

Trust: 1.3

vendor:oraclemodel:goldengate application adaptersscope:eqversion:12.3.2.1.1

Trust: 1.3

vendor:oraclemodel:flexcube investor servicingscope:eqversion:12.0.4

Trust: 1.3

vendor:oraclemodel:configuration managerscope:eqversion:12.1.2.0.5

Trust: 1.3

vendor:oraclemodel:configuration managerscope:eqversion:12.1.2.0.2

Trust: 1.3

vendor:oraclemodel:communications service brokerscope:eqversion:6.0

Trust: 1.3

vendor:oraclemodel:communications pricing design centerscope:eqversion:12.0

Trust: 1.3

vendor:oraclemodel:communications pricing design centerscope:eqversion:11.1

Trust: 1.3

vendor:oraclemodel:communications online mediation controllerscope:eqversion:6.1

Trust: 1.3

vendor:oraclemodel:bi publisherscope:eqversion:12.2.1.4.0

Trust: 1.3

vendor:oraclemodel:bi publisherscope:eqversion:12.2.1.3.0

Trust: 1.3

vendor:oraclemodel:bi publisherscope:eqversion:11.1.1.9.0

Trust: 1.3

vendor:oraclemodel:bi publisherscope:eqversion:11.1.1.7.0

Trust: 1.3

vendor:oraclemodel:api gatewayscope:eqversion:11.1.2.4.0

Trust: 1.3

vendor:oraclemodel:jdeveloperscope:eqversion:12.2.1.3.0

Trust: 1.0

vendor:oraclemodel:financial services lending and leasingscope:lteversion:14.8.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:lteversion:17.12.7

Trust: 1.0

vendor:oraclemodel:financial services profitability managementscope:eqversion:6.1.1

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.0

Trust: 1.0

vendor:oraclemodel:insurance policy administrationscope:eqversion:10.1

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:gteversion:16.2.0

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:oraclemodel:endeca information discovery studioscope:eqversion:3.2.0

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.2.4

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.7

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:oraclemodel:enterprise manager for fusion middlewarescope:eqversion:12.1.0.5

Trust: 1.0

vendor:oraclemodel:insurance policy administrationscope:eqversion:11.0

Trust: 1.0

vendor:oraclemodel:financial services hedge management and ifrs valuationsscope:eqversion:8.0.4

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.2.0

Trust: 1.0

vendor:oraclemodel:insurance policy administrationscope:eqversion:10.0

Trust: 1.0

vendor:oraclemodel:financial services analytical applications infrastructurescope:lteversion:8.0.7.0.0

Trust: 1.0

vendor:oraclemodel:communications network integrityscope:lteversion:7.3.6

Trust: 1.0

vendor:oraclemodel:mysql enterprise monitorscope:gteversion:8.0.0.0.0

Trust: 1.0

vendor:oraclemodel:communications interactive session recorderscope:lteversion:6.2

Trust: 1.0

vendor:oraclemodel:financial services hedge management and ifrs valuationsscope:eqversion:8.0.5

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.1.0

Trust: 1.0

vendor:oraclemodel:banking platformscope:eqversion:2.6.0

Trust: 1.0

vendor:oraclemodel:communications network integrityscope:gteversion:7.3.2

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.2.4

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:14.1.1.0.0

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.3.0

Trust: 1.0

vendor:netappmodel:service level managerscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:rapid planningscope:eqversion:12.1

Trust: 1.0

vendor:redhatmodel:fusescope:eqversion:1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.6

Trust: 1.0

vendor:oraclemodel:enterprise manager for oracle databasescope:eqversion:13.2.2

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:15.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.4

Trust: 1.0

vendor:oraclemodel:instantis enterprisetrackscope:gteversion:17.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.5

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.4

Trust: 1.0

vendor:oraclemodel:retail predictive application serverscope:eqversion:15.0.3

Trust: 1.0

vendor:oraclemodel:retail open commerce platformscope:eqversion:6.0.0

Trust: 1.0

vendor:oraclemodel:enterprise manager for mysql databasescope:lteversion:13.2.2.0.0

Trust: 1.0

vendor:oraclemodel:enterprise manager for oracle databasescope:eqversion:12.1.0.8

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.5

Trust: 1.0

vendor:oraclemodel:financial services behavior detection platformscope:eqversion:6.1.1

Trust: 1.0

vendor:oraclemodel:utilities work and asset managementscope:eqversion:1.9.1.2.12

Trust: 1.0

vendor:oraclemodel:retail open commerce platformscope:eqversion:5.3.0

Trust: 1.0

vendor:oraclemodel:retail clearance optimization enginescope:eqversion:14.0.5

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.2.6

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:16.0

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:10.4.7

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:netappmodel:oncommand insightscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.2.2

Trust: 1.0

vendor:oraclemodel:enterprise manager for fusion middlewarescope:eqversion:13.2.0.0

Trust: 1.0

vendor:oraclemodel:mysql enterprise monitorscope:gteversion:3.4.0.0

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.2.3

Trust: 1.0

vendor:oraclemodel:flexcube investor servicingscope:eqversion:12.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:12.1.3.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.2.6

Trust: 1.0

vendor:oraclemodel:retail service backbonescope:eqversion:14.1

Trust: 1.0

vendor:oraclemodel:enterprise manager base platformscope:eqversion:13.2.0.0

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:10.4.7

Trust: 1.0

vendor:oraclemodel:jd edwards enterpriseone toolsscope:eqversion:4.0.1.0

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.2.2

Trust: 1.0

vendor:oraclemodel:goldengatescope:eqversion:12.3.2.1.1

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.2.5

Trust: 1.0

vendor:oraclemodel:enterprise manager for peoplesoftscope:eqversion:13.2.1.1

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.1.1

Trust: 1.0

vendor:oraclemodel:enterprise manager for peoplesoftscope:eqversion:13.1.1.1

Trust: 1.0

vendor:apachemodel:log4jscope:ltversion:2.8.2

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:lteversion:16.2.11

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.2.3

Trust: 1.0

vendor:oraclemodel:flexcube investor servicingscope:eqversion:12.4.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.6

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.2.10

Trust: 1.0

vendor:oraclemodel:autovue vuelink integrationscope:eqversion:21.0.0

Trust: 1.0

vendor:oraclemodel:policy automation connector for siebelscope:eqversion:10.4.6

Trust: 1.0

vendor:oraclemodel:banking platformscope:eqversion:2.6.1

Trust: 1.0

vendor:netappmodel:snapcenterscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:in-memory performance-driven planningscope:eqversion:12.2

Trust: 1.0

vendor:oraclemodel:financial services profitability managementscope:gteversion:8.0.0.0.0

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.1.1

Trust: 1.0

vendor:oraclemodel:enterprise data qualityscope:eqversion:12.2.1.3.0

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.2.5

Trust: 1.0

vendor:netappmodel:oncommand workflow automationscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications converged application server - service controllerscope:eqversion:6.1

Trust: 1.0

vendor:oraclemodel:communications instant messaging serverscope:eqversion:10.0.1.3.0

Trust: 1.0

vendor:oraclemodel:financial services behavior detection platformscope:gteversion:8.0.0.0.0

Trust: 1.0

vendor:oraclemodel:timesten in-memory databasescope:eqversion:11.2.2.8.49

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:gteversion:17.12.0

Trust: 1.0

vendor:oraclemodel:identity manager connectorscope:eqversion:9.0

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.2.10

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.2.7

Trust: 1.0

vendor:oraclemodel:financial services profitability managementscope:lteversion:8.0.7.0.0

Trust: 1.0

vendor:oraclemodel:retail extract transform and loadscope:eqversion:19.0

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.4.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.3

Trust: 1.0

vendor:oraclemodel:banking platformscope:eqversion:2.6.2

Trust: 1.0

vendor:oraclemodel:financial services analytical applications infrastructurescope:gteversion:8.0.0.0.0

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.2.9

Trust: 1.0

vendor:oraclemodel:autovue vuelink integrationscope:eqversion:21.0.1

Trust: 1.0

vendor:oraclemodel:financial services lending and leasingscope:gteversion:14.1.0

Trust: 1.0

vendor:oraclemodel:in-memory performance-driven planningscope:eqversion:12.1

Trust: 1.0

vendor:oraclemodel:mysql enterprise monitorscope:gteversion:4.0.0.0

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.2.1

Trust: 1.0

vendor:oraclemodel:financial services loan loss forecasting and provisioningscope:eqversion:8.0.4

Trust: 1.0

vendor:oraclemodel:financial services analytical applications infrastructurescope:lteversion:7.3.3.0.2

Trust: 1.0

vendor:netappmodel:oncommand api servicesscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:instantis enterprisetrackscope:lteversion:17.3

Trust: 1.0

vendor:oraclemodel:fusion middleware mapviewerscope:eqversion:12.2.1.2

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:10.3.6.0.0

Trust: 1.0

vendor:oraclemodel:financial services behavior detection platformscope:lteversion:8.0.4.0.0

Trust: 1.0

vendor:oraclemodel:fusion middleware mapviewerscope:eqversion:12.2.1.3

Trust: 1.0

vendor:netappmodel:storage automation storescope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.4

Trust: 1.0

vendor:oraclemodel:financial services loan loss forecasting and provisioningscope:eqversion:8.0.5

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.2.9

Trust: 1.0

vendor:oraclemodel:retail advanced inventory planningscope:eqversion:14.0

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:14.1.0

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.2.7

Trust: 1.0

vendor:oraclemodel:rapid planningscope:eqversion:12.2

Trust: 1.0

vendor:oraclemodel:communications messaging serverscope:ltversion:8.0.2

Trust: 1.0

vendor:oraclemodel:mysql enterprise monitorscope:lteversion:4.0.4.5235

Trust: 1.0

vendor:oraclemodel:policy automationscope:eqversion:12.2.8

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.2.1

Trust: 1.0

vendor:oraclemodel:soa suitescope:eqversion:12.2.2.0.0

Trust: 1.0

vendor:oraclemodel:flexcube investor servicingscope:eqversion:14.0.0

Trust: 1.0

vendor:oraclemodel:insurance policy administrationscope:eqversion:10.2

Trust: 1.0

vendor:oraclemodel:communications webrtc session controllerscope:ltversion:7.2

Trust: 1.0

vendor:oraclemodel:retail service backbonescope:eqversion:15.0

Trust: 1.0

vendor:oraclemodel:financial services regulatory reporting with agilereporterscope:eqversion:8.0.9.2.0

Trust: 1.0

vendor:oraclemodel:enterprise manager base platformscope:eqversion:12.1.0.5

Trust: 1.0

vendor:oraclemodel:financial services analytical applications infrastructurescope:gteversion:7.3.3.0.0

Trust: 1.0

vendor:oraclemodel:financial services lending and leasingscope:eqversion:12.5.0

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.2.0

Trust: 1.0

vendor:oraclemodel:application testing suitescope:eqversion:13.3.0.1

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:eqversion:12.2.8

Trust: 1.0

vendor:oraclemodel:mysql enterprise monitorscope:lteversion:8.0.0.8131

Trust: 1.0

vendor:oraclemodel:mysql enterprise monitorscope:lteversion:3.4.7.4297

Trust: 1.0

vendor:oraclemodel:flexcube investor servicingscope:eqversion:12.3.0

Trust: 1.0

vendor:oraclemodel:communications interactive session recorderscope:gteversion:6.0

Trust: 1.0

vendor:oraclemodel:retail service backbonescope:eqversion:16.0

Trust: 1.0

vendor:oraclemodel:peoplesoft enterprise fin installscope:eqversion:9.2

Trust: 1.0

vendor:oraclemodel:insurance rules palettescope:eqversion:10.2

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:14.0.0

Trust: 1.0

vendor:redhatmodel:jboss web server for rhelscope:eqversion:3.17

Trust: 0.3

vendor:redhatmodel:jboss web server for rhelscope:eqversion:3.16

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.3

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux computenode optionalscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux computenodescope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux client optionalscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux clientscope:eqversion:7

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:10.3.60

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.3

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.2

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:12.1.3.0

Trust: 0.3

vendor:oraclemodel:webcenter portalscope:eqversion:12.2.1.3.0

Trust: 0.3

vendor:oraclemodel:webcenter portalscope:eqversion:12.2.1.2.0

Trust: 0.3

vendor:oraclemodel:utilities frameworkscope:eqversion:4.3

Trust: 0.3

vendor:oraclemodel:utilities frameworkscope:eqversion:4.2

Trust: 0.3

vendor:oraclemodel:utilities frameworkscope:eqversion:2.2

Trust: 0.3

vendor:oraclemodel:transportation managementscope:eqversion:6.4.2

Trust: 0.3

vendor:oraclemodel:transportation managementscope:eqversion:6.4.1

Trust: 0.3

vendor:oraclemodel:transportation managementscope:eqversion:6.3.5

Trust: 0.3

vendor:oraclemodel:transportation managementscope:eqversion:6.3.4

Trust: 0.3

vendor:oraclemodel:transportation managementscope:eqversion:6.3.3

Trust: 0.3

vendor:oraclemodel:transportation managementscope:eqversion:6.3.2

Trust: 0.3

vendor:oraclemodel:transportation managementscope:eqversion:6.3.1

Trust: 0.3

vendor:oraclemodel:transportation managementscope:eqversion:6.2.11

Trust: 0.3

vendor:oraclemodel:transportation managementscope:eqversion:6.3.7

Trust: 0.3

vendor:oraclemodel:transportation managementscope:eqversion:6.3.6

Trust: 0.3

vendor:oraclemodel:secure global desktopscope:eqversion:5.3

Trust: 0.3

vendor:oraclemodel:retail xstore point of servicescope:eqversion:15.0.1

Trust: 0.3

vendor:oraclemodel:retail xstore point of servicescope:eqversion:7.1.6

Trust: 0.3

vendor:oraclemodel:retail xstore point of servicescope:eqversion:7.0.6

Trust: 0.3

vendor:oraclemodel:retail xstore point of servicescope:eqversion:6.0.11

Trust: 0.3

vendor:oraclemodel:retail workforce managementscope:eqversion:1.64

Trust: 0.3

vendor:oraclemodel:retail workforce managementscope:eqversion:1.60.7

Trust: 0.3

vendor:oraclemodel:retail store inventory managementscope:eqversion:16.0.1

Trust: 0.3

vendor:oraclemodel:retail store inventory managementscope:eqversion:15.0.2

Trust: 0.3

vendor:oraclemodel:retail store inventory managementscope:eqversion:14.1.3

Trust: 0.3

vendor:oraclemodel:retail store inventory managementscope:eqversion:14.0.4

Trust: 0.3

vendor:oraclemodel:retail store inventory managementscope:eqversion:13.2.9

Trust: 0.3

vendor:oraclemodel:retail store inventory managementscope:eqversion:13.1.9

Trust: 0.3

vendor:oraclemodel:retail store inventory managementscope:eqversion:13.0.7

Trust: 0.3

vendor:oraclemodel:retail store inventory managementscope:eqversion:12.0.12

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:14.1.3

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:14.0.4

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:2.4.9

Trust: 0.3

vendor:oraclemodel:retail returns managementscope:eqversion:2.3.8

Trust: 0.3

vendor:oraclemodel:retail price managementscope:eqversion:16.0

Trust: 0.3

vendor:oraclemodel:retail price managementscope:eqversion:15.0

Trust: 0.3

vendor:oraclemodel:retail price managementscope:eqversion:14.1

Trust: 0.3

vendor:oraclemodel:retail price managementscope:eqversion:14.0

Trust: 0.3

vendor:oraclemodel:retail price managementscope:eqversion:13.2

Trust: 0.3

vendor:oraclemodel:retail price managementscope:eqversion:13.1

Trust: 0.3

vendor:oraclemodel:retail price managementscope:eqversion:13.0

Trust: 0.3

vendor:oraclemodel:retail price managementscope:eqversion:12.0

Trust: 0.3

vendor:oraclemodel:retail point-of-servicescope:eqversion:14.1.3

Trust: 0.3

vendor:oraclemodel:retail point-of-servicescope:eqversion:14.0.4

Trust: 0.3

vendor:oraclemodel:retail order management systemscope:eqversion:5.0

Trust: 0.3

vendor:oraclemodel:retail order management systemscope:eqversion:4.7

Trust: 0.3

vendor:oraclemodel:retail order management systemscope:eqversion:4.5

Trust: 0.3

vendor:oraclemodel:retail order management systemscope:eqversion:4.0

Trust: 0.3

vendor:oraclemodel:retail order brokerscope:eqversion:5.2

Trust: 0.3

vendor:oraclemodel:retail order brokerscope:eqversion:5.1

Trust: 0.3

vendor:oraclemodel:retail order brokerscope:eqversion:16.0

Trust: 0.3

vendor:oraclemodel:retail order brokerscope:eqversion:15.0

Trust: 0.3

vendor:oraclemodel:retail open commerce platformscope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:retail open commerce platformscope:eqversion:5.3

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:16.0

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:15.0

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:14.1

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:14.0

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:13.2

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:13.1

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:13.0

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:12.0

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:11.0

Trust: 0.3

vendor:oraclemodel:retail invoice matchingscope:eqversion:10.2

Trust: 0.3

vendor:oraclemodel:retail insightsscope:eqversion:16.0

Trust: 0.3

vendor:oraclemodel:retail insightsscope:eqversion:15.0

Trust: 0.3

vendor:oraclemodel:retail insightsscope:eqversion:14.1

Trust: 0.3

vendor:oraclemodel:retail insightsscope:eqversion:14.0

Trust: 0.3

vendor:oraclemodel:retail fiscal managementscope:eqversion:14.1

Trust: 0.3

vendor:oraclemodel:retail eftlinkscope:eqversion:16.0.3

Trust: 0.3

vendor:oraclemodel:retail eftlinkscope:eqversion:15.0.2

Trust: 0.3

vendor:oraclemodel:retail customer management and segmentation foundationscope:eqversion:16.0

Trust: 0.3

vendor:oraclemodel:retail customer management and segmentation foundationscope:eqversion:15.0

Trust: 0.3

vendor:oraclemodel:retail customer management and segmentation foundationscope:eqversion:11.4

Trust: 0.3

vendor:oraclemodel:retail customer management and segmentation foundationscope:eqversion:10.8

Trust: 0.3

vendor:oraclemodel:retail convenience and fuel posscope:eqversion:2.1.132

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:14.1.3

Trust: 0.3

vendor:oraclemodel:retail central officescope:eqversion:14.0.4

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:14.1.3

Trust: 0.3

vendor:oraclemodel:retail back officescope:eqversion:14.0.4

Trust: 0.3

vendor:oraclemodel:retail assortment planningscope:eqversion:16.0.1

Trust: 0.3

vendor:oraclemodel:retail assortment planningscope:eqversion:15.0.3

Trust: 0.3

vendor:oraclemodel:retail assortment planningscope:eqversion:14.1.3

Trust: 0.3

vendor:oraclemodel:retail advanced inventory planningscope:eqversion:14.1

Trust: 0.3

vendor:oraclemodel:retail advanced inventory planningscope:eqversion:13.4

Trust: 0.3

vendor:oraclemodel:retail advanced inventory planningscope:eqversion:13.2

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise fin supply chain portal pack brazilscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise fin supply chain portal pack argentinascope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:micros retail xbri loss preventionscope:eqversion:10.8.1

Trust: 0.3

vendor:oraclemodel:micros retail xbri loss preventionscope:eqversion:10.8

Trust: 0.3

vendor:oraclemodel:micros retail xbri loss preventionscope:eqversion:10.7

Trust: 0.3

vendor:oraclemodel:micros retail xbri loss preventionscope:eqversion:10.6

Trust: 0.3

vendor:oraclemodel:micros retail xbri loss preventionscope:eqversion:10.5

Trust: 0.3

vendor:oraclemodel:micros retail xbri loss preventionscope:eqversion:10.0.1

Trust: 0.3

vendor:oraclemodel:micros lucasscope:eqversion:2.9.5

Trust: 0.3

vendor:oraclemodel:managed file transferscope:eqversion:12.2.1.3.0

Trust: 0.3

vendor:oraclemodel:managed file transferscope:eqversion:12.2.1.2.0

Trust: 0.3

vendor:oraclemodel:managed file transferscope:eqversion:12.1.3.0.0

Trust: 0.3

vendor:oraclemodel:jdeveloperscope:eqversion:12.2.1.0.0

Trust: 0.3

vendor:oraclemodel:jd edwards world security a9.4scope: - version: -

Trust: 0.3

vendor:oraclemodel:jd edwards world security a9.3scope: - version: -

Trust: 0.3

vendor:oraclemodel:jd edwards world security a9.2scope: - version: -

Trust: 0.3

vendor:oraclemodel:insurance rules palettescope:eqversion:10.2.0

Trust: 0.3

vendor:oraclemodel:flexcube private bankingscope:eqversion:12.0

Trust: 0.3

vendor:oraclemodel:flexcube private bankingscope:eqversion:2.1

Trust: 0.3

vendor:oraclemodel:flexcube investor servicingscope:eqversion:14.0

Trust: 0.3

vendor:oraclemodel:flexcube investor servicingscope:eqversion:12.4

Trust: 0.3

vendor:oraclemodel:flexcube investor servicingscope:eqversion:12.3

Trust: 0.3

vendor:oraclemodel:flexcube investor servicingscope:eqversion:12.1

Trust: 0.3

vendor:oraclemodel:flexcube core bankingscope:eqversion:11.7

Trust: 0.3

vendor:oraclemodel:flexcube core bankingscope:eqversion:11.6

Trust: 0.3

vendor:oraclemodel:flexcube core bankingscope:eqversion:11.5

Trust: 0.3

vendor:oraclemodel:enterprise repositoryscope:eqversion:12.1.3.0.0

Trust: 0.3

vendor:oraclemodel:enterprise repositoryscope:eqversion:11.1.1.7.0

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.3.2

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.2.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.7

Trust: 0.3

vendor:oraclemodel:endeca information discovery integratorscope:eqversion:3.2

Trust: 0.3

vendor:oraclemodel:endeca information discovery integratorscope:eqversion:3.1

Trust: 0.3

vendor:oraclemodel:communications webrtc session controllerscope:eqversion:7.1

Trust: 0.3

vendor:oraclemodel:communications webrtc session controllerscope:eqversion:7.0

Trust: 0.3

vendor:oraclemodel:communications unified inventory managementscope:eqversion:7.3

Trust: 0.3

vendor:oraclemodel:communications unified inventory managementscope:eqversion:7.1

Trust: 0.3

vendor:oraclemodel:communications unified inventory managementscope:eqversion:7.0

Trust: 0.3

vendor:oraclemodel:communications services gatekeeperscope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:communications services gatekeeperscope:eqversion:5.1

Trust: 0.3

vendor:oraclemodel:communications network intelligencescope:eqversion:7.3

Trust: 0.3

vendor:oraclemodel:communications network charging and controlscope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:communications messaging serverscope:eqversion:8.0.1.1.0

Trust: 0.3

vendor:oraclemodel:communications messaging serverscope:eqversion:8.0

Trust: 0.3

vendor:oraclemodel:communications messaging serverscope:eqversion:7.0

Trust: 0.3

vendor:oraclemodel:communications messaging serverscope:eqversion:6.3

Trust: 0.3

vendor:oraclemodel:communications messaging serverscope:eqversion:3.0

Trust: 0.3

vendor:oraclemodel:communications interactive session recorderscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:communications interactive session recorderscope:eqversion:6.1

Trust: 0.3

vendor:oraclemodel:communications interactive session recorderscope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:communications convergent charging controllerscope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:communications converged application server service controllerscope:eqversion:-6.1

Trust: 0.3

vendor:oraclemodel:communications brm elastic charging enginescope:eqversion:-7.5

Trust: 0.3

vendor:oraclemodel:business intelligence data warehouse administration consolescope:eqversion:11.1.1.6.4

Trust: 0.3

vendor:oraclemodel:big data discoveryscope:eqversion:1.6

Trust: 0.3

vendor:oraclemodel:autovue for agile product lifecycle managementscope:eqversion:21.0.1

Trust: 0.3

vendor:oraclemodel:autovue for agile product lifecycle managementscope:eqversion:21.0

Trust: 0.3

vendor:oraclemodel:application testing suitescope:eqversion:13.2.0.1

Trust: 0.3

vendor:oraclemodel:application testing suitescope:eqversion:13.1.0.1

Trust: 0.3

vendor:oraclemodel:application testing suitescope:eqversion:12.5.0.3

Trust: 0.3

vendor:oraclemodel:agile plm mcad connectorscope:eqversion:3.6

Trust: 0.3

vendor:oraclemodel:agile plm mcad connectorscope:eqversion:3.5

Trust: 0.3

vendor:oraclemodel:agile plm mcad connectorscope:eqversion:3.4

Trust: 0.3

vendor:oraclemodel:agile plm mcad connectorscope:eqversion:3.3

Trust: 0.3

vendor:oraclemodel:agile plmscope:eqversion:9.3.5

Trust: 0.3

vendor:oraclemodel:agile plmscope:eqversion:9.3.3

Trust: 0.3

vendor:oraclemodel:agile plmscope:eqversion:9.3.6

Trust: 0.3

vendor:oraclemodel:agile plmscope:eqversion:9.3.4

Trust: 0.3

vendor:oraclemodel:agile material and equipment management for pharmaceuticalsscope:eqversion:9.3.4

Trust: 0.3

vendor:oraclemodel:agile material and equipment management for pharmaceuticalsscope:eqversion:9.3.3

Trust: 0.3

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.2.1

Trust: 0.3

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.1.3

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.8.1

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.6.2

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.6.1

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.4.1

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.0.2

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.0.1

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.8

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.7

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.6

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.5

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.4

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.3

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.2

Trust: 0.3

vendor:apachemodel:log4jscope:eqversion:2.1

Trust: 0.3

vendor:apachemodel:log4j 2.0-alpha1scope: - version: -

Trust: 0.3

vendor:apachemodel:log4j rc2scope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:log4j rc1scope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:log4j beta9scope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:log4j beta8scope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:log4j beta7scope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:log4j beta6scope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:log4j beta5scope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:log4j beta4scope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:log4j beta3scope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:log4j beta2scope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:log4j beta1scope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:log4j alpha2scope:eqversion:2.0

Trust: 0.3

vendor:oraclemodel:communications webrtc session controllerscope:neversion:7.2

Trust: 0.3

vendor:oraclemodel:communications messaging serverscope:neversion:8.0.2

Trust: 0.3

vendor:apachemodel:log4jscope:neversion:2.8.2

Trust: 0.3

sources: BID: 97702 // NVD: CVE-2017-5645

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-5645
value: CRITICAL

Trust: 1.0

VULHUB: VHN-113848
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-5645
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-113848
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-5645
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-113848 // NVD: CVE-2017-5645

PROBLEMTYPE DATA

problemtype:CWE-502

Trust: 1.1

sources: VULHUB: VHN-113848 // NVD: CVE-2017-5645

THREAT TYPE

remote

Trust: 0.6

sources: PACKETSTORM: 144347 // PACKETSTORM: 144358 // PACKETSTORM: 144019 // PACKETSTORM: 144360 // PACKETSTORM: 143670 // PACKETSTORM: 144018

TYPE

arbitrary

Trust: 0.6

sources: PACKETSTORM: 144347 // PACKETSTORM: 144358 // PACKETSTORM: 144019 // PACKETSTORM: 144360 // PACKETSTORM: 143670 // PACKETSTORM: 144018

EXTERNAL IDS

db:NVDid:CVE-2017-5645

Trust: 2.2

db:BIDid:97702

Trust: 1.4

db:OPENWALLid:OSS-SECURITY/2019/12/19/2

Trust: 1.1

db:SECTRACKid:1041294

Trust: 1.1

db:SECTRACKid:1040200

Trust: 1.1

db:PACKETSTORMid:144018

Trust: 0.2

db:PACKETSTORMid:143670

Trust: 0.2

db:PACKETSTORMid:144597

Trust: 0.2

db:PACKETSTORMid:144019

Trust: 0.2

db:PACKETSTORMid:145263

Trust: 0.1

db:PACKETSTORMid:143500

Trust: 0.1

db:PACKETSTORMid:144014

Trust: 0.1

db:PACKETSTORMid:144013

Trust: 0.1

db:PACKETSTORMid:144017

Trust: 0.1

db:PACKETSTORMid:144596

Trust: 0.1

db:PACKETSTORMid:143499

Trust: 0.1

db:PACKETSTORMid:145262

Trust: 0.1

db:PACKETSTORMid:142856

Trust: 0.1

db:CNNVDid:CNNVD-201704-852

Trust: 0.1

db:SEEBUGid:SSVID-92965

Trust: 0.1

db:VULHUBid:VHN-113848

Trust: 0.1

db:PACKETSTORMid:144347

Trust: 0.1

db:PACKETSTORMid:144358

Trust: 0.1

db:PACKETSTORMid:144360

Trust: 0.1

db:PACKETSTORMid:144359

Trust: 0.1

sources: VULHUB: VHN-113848 // BID: 97702 // PACKETSTORM: 144347 // PACKETSTORM: 144358 // PACKETSTORM: 144597 // PACKETSTORM: 144019 // PACKETSTORM: 144360 // PACKETSTORM: 143670 // PACKETSTORM: 144359 // PACKETSTORM: 144018 // NVD: CVE-2017-5645

REFERENCES

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

Trust: 1.4

url:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Trust: 1.4

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

Trust: 1.4

url:https://issues.apache.org/jira/browse/log4j2-1863

Trust: 1.4

url:https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Trust: 1.4

url:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Trust: 1.4

url:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Trust: 1.4

url:https://access.redhat.com/errata/rhsa-2017:2423

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2017:2637

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2017:2638

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2017:2808

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2017:2809

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2017:2810

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2017:2811

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2017:2889

Trust: 1.2

url:http://www.securityfocus.com/bid/97702

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20180726-0002/

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20181107-0002/

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuapr2021.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuapr2020.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpujan2020.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpujan2021.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpujan2022.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpujul2020.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuoct2020.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 1.1

url:https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2019/12/19/2

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:1417

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:1801

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:1802

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:2633

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:2635

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:2636

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:2888

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:3244

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:3399

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2017:3400

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:1545

Trust: 1.1

url:http://www.securitytracker.com/id/1040200

Trust: 1.1

url:http://www.securitytracker.com/id/1041294

Trust: 1.1

url:https://access.redhat.com/security/cve/cve-2017-5645

Trust: 1.1

url:https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5%40%3cdev.tika.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f%40%3cdev.tika.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/e8fb7d76a244ee997ba4b217d6171227f7c2521af8c7c5b16cba27bc%40%3cdev.logging.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3cissues.bookkeeper.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r0831e2e52a390758ce39a6193f82c11c295175adce6e6307de28c287%40%3cissues.beam.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rdbd579dc223f06af826d7de340218ee2f80d8b43fa7e4decb2a63f44%40%3cgithub.beam.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/ra9a682bc0a8dff1c5cefdef31c7c25f096d9121207cf2d74e2fc563d%40%3ccommits.logging.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rcbb79023a7c8494cb389cd3d95420fa9e0d531ece0b780b8c1f99422%40%3ccommits.doris.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1%40%3cdev.tika.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3cissues.geode.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r23369fd603eb6d62d3b883a0a28d12052dcbd1d6d531137124cd7f83%40%3cgithub.beam.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9d5c1b558a15d374bd5abd2d3ae3ca7e50e796a0efdcf91e9c5b4cdd%40%3cgithub.beam.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8%40%3cdev.tika.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rbfa7a0742be4981a3f9356a23d0e1a5f2e1eabde32a1a3d8e41420f8%40%3cgithub.beam.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c%40%3cdev.tika.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1%40%3cdev.tika.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60%40%3cdev.tika.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/0dcca05274d20ef2d72584edcf8c917bbb13dbbd7eb35cae909d02e9%40%3cdev.logging.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad%40%3cdev.tika.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3cdev.logging.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7%40%3cdev.tika.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3ccommits.druid.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/84cc4266238e057b95eb95dfd8b29d46a2592e7672c12c92f68b2917%40%3cannounce.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6%40%3cdev.tika.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2%40%3cdev.tika.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26%40%3cdev.tika.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r94b5aae09c4bcff5d06cf641be17b00bd83ba7e10cad737bf16a1b8f%40%3cgithub.beam.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826%40%3cissues.activemq.apache.org%3e

Trust: 1.0

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-5645

Trust: 0.8

url:https://bugzilla.redhat.com/):

Trust: 0.8

url:https://access.redhat.com/security/team/contact/

Trust: 0.8

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.8

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-9970

Trust: 0.4

url:https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/version-7.0/

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-6644

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2017-2582

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2015-6644

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2017-7536

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2014-9970

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2017-7536

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2017-2582

Trust: 0.4

url:http://seclists.org/oss-sec/2017/q2/78

Trust: 0.3

url:https://git-wip-us.apache.org/repos/asf?p=logging-log4j2.git;h=5dcc19215827db29c993d0305ee2b0d8dd05939d

Trust: 0.3

url:http://www.apache.org/

Trust: 0.3

url:https://logging.apache.org/log4j/2.x/

Trust: 0.3

url:https://issues.jboss.org/):

Trust: 0.3

url:https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/version-7.0/installation-guide/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-5664

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-5664

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2017-7525

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-7525

Trust: 0.2

url:https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform?version=6.4/

Trust: 0.2

url:https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397@%3cissues.activemq.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/84cc4266238e057b95eb95dfd8b29d46a2592e7672c12c92f68b2917@%3cannounce.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r9d5c1b558a15d374bd5abd2d3ae3ca7e50e796a0efdcf91e9c5b4cdd@%3cgithub.beam.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r94b5aae09c4bcff5d06cf641be17b00bd83ba7e10cad737bf16a1b8f@%3cgithub.beam.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rbfa7a0742be4981a3f9356a23d0e1a5f2e1eabde32a1a3d8e41420f8@%3cgithub.beam.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r23369fd603eb6d62d3b883a0a28d12052dcbd1d6d531137124cd7f83@%3cgithub.beam.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rdbd579dc223f06af826d7de340218ee2f80d8b43fa7e4decb2a63f44@%3cgithub.beam.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r0831e2e52a390758ce39a6193f82c11c295175adce6e6307de28c287@%3cissues.beam.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3cissues.bookkeeper.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rcbb79023a7c8494cb389cd3d95420fa9e0d531ece0b780b8c1f99422@%3ccommits.doris.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3ccommits.druid.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3cissues.geode.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/ra9a682bc0a8dff1c5cefdef31c7c25f096d9121207cf2d74e2fc563d@%3ccommits.logging.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/e8fb7d76a244ee997ba4b217d6171227f7c2521af8c7c5b16cba27bc@%3cdev.logging.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125@%3cdev.logging.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/0dcca05274d20ef2d72584edcf8c917bbb13dbbd7eb35cae909d02e9@%3cdev.logging.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1@%3cdev.tika.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c@%3cdev.tika.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6@%3cdev.tika.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f@%3cdev.tika.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8@%3cdev.tika.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7@%3cdev.tika.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1@%3cdev.tika.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60@%3cdev.tika.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5@%3cdev.tika.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26@%3cdev.tika.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2@%3cdev.tika.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad@%3cdev.tika.apache.org%3e

Trust: 0.1

url:https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform&downloadtype=securitypatches&version=7.0

Trust: 0.1

url:https://access.redhat.com/documentation/en/red-hat-jboss-bpm-suite/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-7957

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=bpm.suite&downloadtype=securitypatches&version=6.4

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7957

Trust: 0.1

sources: VULHUB: VHN-113848 // BID: 97702 // PACKETSTORM: 144347 // PACKETSTORM: 144358 // PACKETSTORM: 144597 // PACKETSTORM: 144019 // PACKETSTORM: 144360 // PACKETSTORM: 143670 // PACKETSTORM: 144359 // PACKETSTORM: 144018 // NVD: CVE-2017-5645

CREDITS

Red Hat

Trust: 0.8

sources: PACKETSTORM: 144347 // PACKETSTORM: 144358 // PACKETSTORM: 144597 // PACKETSTORM: 144019 // PACKETSTORM: 144360 // PACKETSTORM: 143670 // PACKETSTORM: 144359 // PACKETSTORM: 144018

SOURCES

db:VULHUBid:VHN-113848
db:BIDid:97702
db:PACKETSTORMid:144347
db:PACKETSTORMid:144358
db:PACKETSTORMid:144597
db:PACKETSTORMid:144019
db:PACKETSTORMid:144360
db:PACKETSTORMid:143670
db:PACKETSTORMid:144359
db:PACKETSTORMid:144018
db:NVDid:CVE-2017-5645

LAST UPDATE DATE

2025-03-07T19:32:03.816000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-113848date:2020-10-20T00:00:00
db:BIDid:97702date:2019-07-17T07:00:00
db:NVDid:CVE-2017-5645date:2024-11-21T03:28:05.320

SOURCES RELEASE DATE

db:VULHUBid:VHN-113848date:2017-04-17T00:00:00
db:BIDid:97702date:2017-04-17T00:00:00
db:PACKETSTORMid:144347date:2017-09-26T03:56:00
db:PACKETSTORMid:144358date:2017-09-27T06:16:07
db:PACKETSTORMid:144597date:2017-10-12T23:35:39
db:PACKETSTORMid:144019date:2017-09-06T04:16:42
db:PACKETSTORMid:144360date:2017-09-27T06:16:28
db:PACKETSTORMid:143670date:2017-08-07T14:42:00
db:PACKETSTORMid:144359date:2017-09-27T06:16:15
db:PACKETSTORMid:144018date:2017-09-06T04:16:37
db:NVDid:CVE-2017-5645date:2017-04-17T21:59:00.373