Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1yYzdoLXg2Y3EtOTg4cc3p0Q
Improper Input Validation in JGroups
JGroups before 4.0 does not require the proper headers for the ENCRYPT and AUTH protocols from nodes joining the cluster, which allows remote attackers to bypass security restrictions and send and receive messages within the cluster via unspecified vectors. Fixes for this issue have been backported to versions 3.6.10.Final and 3.2.16.Final.
Permalink: https://github.com/advisories/GHSA-rc7h-x6cq-988qJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yYzdoLXg2Y3EtOTg4cc3p0Q
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 2 years ago
Updated: 10 months ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-rc7h-x6cq-988q, CVE-2016-2141
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-2141
- https://access.redhat.com/errata/RHSA-2016:1345
- https://access.redhat.com/errata/RHSA-2016:1346
- https://access.redhat.com/errata/RHSA-2016:1347
- https://access.redhat.com/errata/RHSA-2016:1374
- https://access.redhat.com/errata/RHSA-2016:1376
- https://access.redhat.com/errata/RHSA-2016:1389
- https://access.redhat.com/errata/RHSA-2016:1432
- https://access.redhat.com/errata/RHSA-2016:1433
- https://access.redhat.com/errata/RHSA-2016:1434
- https://issues.jboss.org/browse/JGRP-2021
- https://lists.apache.org/thread.html/ra18cac97416abc2958db0b107877c31da28d884fa6e70fd89c87384a@%3Cdev.geode.apache.org%3E
- https://lists.apache.org/thread.html/rb37cc937d4fc026fb56de4b4ec0d054aa4083c1a4edd0d8360c068a0@%3Cdev.geode.apache.org%3E
- https://rhn.redhat.com/errata/RHSA-2016-1328.html
- https://rhn.redhat.com/errata/RHSA-2016-1329.html
- https://rhn.redhat.com/errata/RHSA-2016-1330.html
- https://rhn.redhat.com/errata/RHSA-2016-1331.html
- https://rhn.redhat.com/errata/RHSA-2016-1332.html
- https://rhn.redhat.com/errata/RHSA-2016-1333.html
- https://rhn.redhat.com/errata/RHSA-2016-1334.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- http://rhn.redhat.com/errata/RHSA-2016-1435.html
- http://rhn.redhat.com/errata/RHSA-2016-1439.html
- http://rhn.redhat.com/errata/RHSA-2016-2035.html
- https://github.com/belaban/JGroups/commit/eeaf5241cce464ef21a2dfc4938729ade9ebef36
- https://issues.redhat.com/browse/JGRP-2055
- https://issues.redhat.com/browse/JGRP-2074
- https://web.archive.org/web/20161013163606/http://www.securityfocus.com/bid/91481
- https://web.archive.org/web/20201207092245/http://www.securitytracker.com/id/1036165
- https://github.com/advisories/GHSA-rc7h-x6cq-988q
Affected Packages
maven:org.jgroups:jgroups
Dependent packages: 271Dependent repositories: 1,915
Downloads:
Affected Version Ranges: < 3.2.16.Final, >= 3.3.0.Alpha1, < 3.6.10.Final
Fixed in: 3.2.16.Final, 3.6.10.Final
All affected versions: 3.2.1-0.Final, 3.2.1-1.Final, 3.2.1-2.Final, 3.2.1-3.Final
All unaffected versions: