CVE-2015-4852

Priority
Description
The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0,
12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary
commands via a crafted serialized Java object in T3 protocol traffic to TCP
port 7001, related to
oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE:
the scope of this CVE is limited to the WebLogic Server product.
Notes
sbeattieaccording to infoq article and digging through openjdk
source, there is at least an embedded copy of xalan xslt in openjdk
which is also vulnerable, though it may be just an example of a
target class to overwrite via desrialization.
same as above for libxalan2-java
mdeslaurThis CVE was originally assigned to Oracle WebLogic, and then
was subsequently used by IBM Websphere. It has been proposed to
use it for commons-collections. See:
http://www.openwall.com/lists/oss-security/2015/11/15/1
Red Hat has assigned CVE-2015-7501 to the issue in
JBoss Middleware Suite
as of 2018-09-19, no indication that this is being fixed in
openjdk, or if it is an issue at all. Marking as ignored.
Package
Upstream:released (3.2.2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (3.2.2-1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (3.2.2-1)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (3.2.2-1)
Ubuntu 20.10 (Groovy Gorilla):not-affected (3.2.2-1)
Patches:
Upstream:http://svn.apache.org/viewvc?view=revision&revision=1713307
Upstream:http://svn.apache.org/viewvc?view=revision&revision=1713537
Package
Upstream:released (4.1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.1-1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (4.1-1)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (4.1-1)
Ubuntu 20.10 (Groovy Gorilla):not-affected (4.1-1)
Patches:
Upstream:https://git-wip-us.apache.org/repos/asf?p=commons-collections.git;a=commit;h=b2b8f4adc557e4ef1ee2fe5e0ab46866c06ec55b
Package
Upstream:not-affected (code not present)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (code not present)
Ubuntu 20.10 (Groovy Gorilla):not-affected (code not present)
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):ignored
Ubuntu 18.04 LTS (Bionic Beaver):ignored
Ubuntu 20.04 LTS (Focal Fossa):ignored
Ubuntu 20.10 (Groovy Gorilla):ignored
More Information

Updated: 2020-07-28 18:28:38 UTC (commit 7b6828437fde0509248708fcdb5b0f7587b85bd1)