SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Oracle Hyperion Vendors:   Oracle
(Oracle Issues Fix for Oracle Hyperion) Sun GlassFish Enterprise Server Flaws Let Remote Users Access Data, Cause Denial of Service Conditions, and Gain Elevated Privileges
SecurityTracker Alert ID:  1038298
SecurityTracker URL:  http://securitytracker.com/id/1038298
CVE Reference:   CVE-2015-3237   (Links to External Site)
Date:  Apr 19 2017
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in Sun GlassFish Enterprise Server. A remote user can access data on the target system. A remote user can cause denial of service conditions on the target system. A remote user can gain elevated privileges. Oracle Hyperion is affected.

A remote user can exploit a flaw in the Oracle GlassFish Server Administration component to partially access data and cause partial denial of service conditions [CVE-2015-3237].

A remote user can exploit a flaw in the Oracle GlassFish Server Web Container component to gain elevated privileges [CVE-2016-3607].

A remote user can exploit a flaw in the Oracle GlassFish Server Administration component to partially access data [CVE-2016-3608, CVE-2016-5477].

The following researchers reported these and other Oracle product vulnerabilities:

Accenture TVM Prague; Adam Willard of Raytheon Foreground Security; Alexander Kornbrust of Red Database Security; Alexander Mirosh of Hewlett Packard Enterprise; Alvaro Munoz of Hewlett Packard Enterprise; Alvaro Munoz of Trend Micro's Zero Day Initiative; Ben Lincoln of NCC Group; Brian Martin of Tenable Network Security; Bruno Cirone; Christian Schneider; David Litchfield of Google;
Devin Rosenbauer of Identity Works LLC; Aleksandar Nikolic of Cisco Talos; Jack Fei of FINRA; Juan Manuel Fernandez Torres of Telefonica.com; Kasper Andersen; Matias Mevied of Onapsis; Matthias Kaiser of Code White; Matthias-Christian Ott; Nicholas Lemonias of Advanced Information Security Corporation; Nicolas Collignon of synacktiv; Reno Robert; Spyridon Chatzimichail of OTE Hellenic Telecommunications Organization S.A.; Stephan Borosh of Veris Group, LLC; Stephen Kost of Integrigy;
Steven Seeley (via Beyond Security's SSD program); Sven Blumenstein of Google; Teemu Kaariainen; Ubais PK; and XOR19 of Trend Micro's Zero Day Initiative.

Impact:   A remote user can obtain data on the target system.

A remote user can cause denial of service conditions.

A remote user can gain elevated privileges on the target system.

Solution:   Oracle has issued a fix for CVE-2015-3237 for Oracle Hyperion.

The Oracle advisory is available at:

http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html

Vendor URL:  www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html (Links to External Site)
Cause:   Not specified

Message History:   This archive entry is a follow-up to the message listed below.
Jul 19 2016 Sun GlassFish Enterprise Server Flaws Let Remote Users Access Data, Cause Denial of Service Conditions, and Gain Elevated Privileges



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC