SB2021111715 - Multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform
Published: November 17, 2021 Updated: December 14, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2021-30129)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in the sshd-core of Apache Mina SSHD. A remote attacker can send specially crafted requests to the server, trigger buffer overflow and perform a denial of service (DoS) attack.
2) Infinite loop (CVE-ID: CVE-2021-37714)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop when processing untrusted HTML and XML code. A remote attacker can consume all available system resources and cause denial of service conditions.
3) Resource exhaustion (CVE-ID: CVE-2021-3629)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to Undertow does not properly control consumption of internal resources when processing HTTP/2 requests. A remote attacker can send specially crafted HTTP/2 requests to the web server, trigger resource exhaustion and perform a denial of service (DoS) attack.
4) Information disclosure (CVE-ID: CVE-2021-20289)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. A remote attacker can obtain endpoint class and method names.
5) Files or Directories Accessible to External Parties (CVE-ID: CVE-2021-3717)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to an incorrect JBOSS_LOCAL_USER challenge location. A local unprivileged user can access any user account on the affected system.
Remediation
Install update from vendor's website.