TROYANOSYVIRUS
Voltar para CVEs

CVE-2016-8735

CRITICALCISA KEV
9.8

Descricao

Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.

Detalhes CVE

Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado4/6/2017
Ultima modificacao4/21/2026
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorApache
ProdutoTomcat
Nome da vulnerabilidadeApache Tomcat Remote Code Execution Vulnerability
Data inclusao KEV2023-05-12
Prazo de remediacao2023-06-02
Uso em ransomwareUnknown

Produtos afetados

apache:tomcatcanonical:ubuntu_linuxdebian:debian_linuxnetapp:7-mode_transition_toolnetapp:oncommand_insightnetapp:oncommand_shiftnetapp:snap_creator_frameworkoracle:agile_engineering_data_managementoracle:agile_plmoracle:communications_application_session_controlleroracle:communications_instant_messaging_serveroracle:communications_interactive_session_recorderoracle:hospitality_guest_accessoracle:micros_relate_crm_softwareoracle:micros_retail_xbri_loss_preventionoracle:mysql_enterprise_monitororacle:retail_convenience_and_fuel_pos_softwareoracle:transportation_managementredhat:jboss_enterprise_web_server

Referencias

https://usn.ubuntu.com/4557-1/(security@apache.org)
http://rhn.redhat.com/errata/RHSA-2017-0457.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/oss-sec/2016/q4/502(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-6.html(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-7.html(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-8.html(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-9.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2016/dsa-3738(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94463(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1037331(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:0455(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:0456(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20180607-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4557-1/(af854a3a-2127-422b-91ae-364da2661108)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.