SB2021072820 - Multiple vulnerabilities in Siebel Core - Server Framework



SB2021072820 - Multiple vulnerabilities in Siebel Core - Server Framework

Published: July 28, 2021

Security Bulletin ID SB2021072820
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2021-2353)

The vulnerability allows a local privileged user to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Loging component in Siebel Core - Server Framework. A local privileged user can exploit this vulnerability to gain access to sensitive information.


2) Improper access control (CVE-ID: CVE-2017-5637)

The vulnerability allows a local user to perform a denial of service attack.

The vulnerability exists due to improper access constrictions to wchp/wchc service. A local user can consume all available CPU resource and perform denial of service (DoS) attack.

3) Deserialization of Untrusted Data (CVE-ID: CVE-2020-24750)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration. A remote attacker can execute arbitrary code on the target system.


Remediation

Install update from vendor's website.