Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1yYzdoLXg2Y3EtOTg4cc3p0Q
Improper Input Validation in JGroups
JGroups before 4.0 does not require the proper headers for the ENCRYPT and AUTH protocols from nodes joining the cluster, which allows remote attackers to bypass security restrictions and send and receive messages within the cluster via unspecified vectors. Fixes for this issue have been backported to versions 3.6.10.Final and 3.2.16.Final.
Permalink: https://github.com/advisories/GHSA-rc7h-x6cq-988qJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yYzdoLXg2Y3EtOTg4cc3p0Q
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 1 year ago
Updated: 1 day ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-rc7h-x6cq-988q, CVE-2016-2141
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-2141
- https://access.redhat.com/errata/RHSA-2016:1345
- https://access.redhat.com/errata/RHSA-2016:1346
- https://access.redhat.com/errata/RHSA-2016:1347
- https://access.redhat.com/errata/RHSA-2016:1374
- https://access.redhat.com/errata/RHSA-2016:1376
- https://access.redhat.com/errata/RHSA-2016:1389
- https://access.redhat.com/errata/RHSA-2016:1432
- https://access.redhat.com/errata/RHSA-2016:1433
- https://access.redhat.com/errata/RHSA-2016:1434
- https://issues.jboss.org/browse/JGRP-2021
- https://lists.apache.org/thread.html/ra18cac97416abc2958db0b107877c31da28d884fa6e70fd89c87384a@%3Cdev.geode.apache.org%3E
- https://lists.apache.org/thread.html/rb37cc937d4fc026fb56de4b4ec0d054aa4083c1a4edd0d8360c068a0@%3Cdev.geode.apache.org%3E
- https://rhn.redhat.com/errata/RHSA-2016-1328.html
- https://rhn.redhat.com/errata/RHSA-2016-1329.html
- https://rhn.redhat.com/errata/RHSA-2016-1330.html
- https://rhn.redhat.com/errata/RHSA-2016-1331.html
- https://rhn.redhat.com/errata/RHSA-2016-1332.html
- https://rhn.redhat.com/errata/RHSA-2016-1333.html
- https://rhn.redhat.com/errata/RHSA-2016-1334.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- http://rhn.redhat.com/errata/RHSA-2016-1435.html
- http://rhn.redhat.com/errata/RHSA-2016-1439.html
- http://rhn.redhat.com/errata/RHSA-2016-2035.html
- https://github.com/belaban/JGroups/commit/eeaf5241cce464ef21a2dfc4938729ade9ebef36
- https://issues.redhat.com/browse/JGRP-2055
- https://issues.redhat.com/browse/JGRP-2074
- https://web.archive.org/web/20161013163606/http://www.securityfocus.com/bid/91481
- https://web.archive.org/web/20201207092245/http://www.securitytracker.com/id/1036165
- https://github.com/advisories/GHSA-rc7h-x6cq-988q
Affected Packages
maven:org.jgroups:jgroups
Versions: < 3.2.16.Final, >= 3.3.0.Alpha1, < 3.6.10.FinalFixed in: 3.2.16.Final, 3.6.10.Final