CVE-2014-3518

Impact:
Important
Public Date:
2014-07-16
CWE:
CWE-306
Bugzilla:
1112545: CVE-2014-3518 JBoss EAP/AS 5: Remote code execution via unauthenticated JMX/RMI connector
JBoss Application Server 5 and supported Red Hat JBoss 5.x products contain JBoss Remoting, which includes a partial implementation of the JMX remoting specification JSR 160. This implementation is provided in jmx-remoting.sar, which is deployed by default in unsupported community releases of JBoss Application Server 5.x. This implementation does not implement security as defined in JSR 160, and therefore does not apply any authentication or authorization constraints. A remote attacker could use this flaw to potentially execute arbitrary code on a vulnerable server. All of the supported Red Hat JBoss 5.x products are not affected by this issue in their default configuration. These products are only vulnerable if JMX remoting is enabled by manually deploying jmx-remoting.sar from the jboss-as/docs/examples directory. Unsupported community releases of JBoss Application Server 5.x are affected. All users of the standalone JBoss Remoting project are also affected. For more information, see https://access.redhat.com/solutions/1120423

Find out more about CVE-2014-3518 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 7.5
Base Metrics AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat JBoss Enterprise Application Platform 5.2 RHSA-2014:0887 2014-07-16
Red Hat JBoss Portal 5.2 RHSA-2014:0887 2014-07-16
JBoss Enterprise BRMS Platform 5.3 RHSA-2014:0887 2014-07-16
Red Hat JBoss SOA Platform 5.3 RHSA-2014:0887 2014-07-16

Affected Packages State

Platform Package State
Red Hat JBoss EAP 6 remoting Not affected
Red Hat JBoss EAP 4 remoting Not affected

Acknowledgements

Red Hat would like to thank Harun ESUR of Sceptive for reporting this issue.

External References

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.