First published: Fri Nov 23 2012(Updated: )
The (1) JNDI service, (2) HA-JNDI service, and (3) HAJNDIFactory invoker servlet in JBoss Enterprise Application Platform 4.3.0 CP10 and 5.1.2, Web Platform 5.1.2, SOA Platform 4.2.0.CP05 and 4.3.0.CP05, Portal Platform 4.3 CP07 and 5.2.x before 5.2.2, and BRMS Platform before 5.3.0 do not properly restrict write access, which allows remote attackers to add, delete, or modify items in a JNDI tree via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat jboss enterprise application platform | =4.3.0-cp10 | |
redhat jboss enterprise application platform | =5.1.2 | |
Red Hat JBoss Enterprise BRMS Platform | <=5.2.0 | |
Red Hat JBoss Portal | =4.3.0-cp07 | |
Red Hat JBoss Portal | =5.2.0 | |
Red Hat JBoss Portal | =5.2.1 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp05 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp05 | |
Red Hat JBoss Enterprise Web Platform | =5.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4605 has a medium severity rating as it involves potential exposure of sensitive information.
To fix CVE-2011-4605, update your JBoss Enterprise Application Platform to the latest version or apply the recommended patches.
CVE-2011-4605 affects JBoss Enterprise Application Platform versions 4.3.0 CP10, 5.1.2, SOA Platform 4.2.0.CP05, and others.
Yes, CVE-2011-4605 is considered exploitable remotely, potentially allowing an attacker to access sensitive services.
Workarounds for CVE-2011-4605 include restricting access to vulnerable services or disabling them if not needed.