First published: Wed Nov 18 2015(Updated: )
Oracle WebLogic Server contains a deserialization of untrusted data vulnerability within Apache Commons, which can allow for for remote code execution.
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/libcommons-collections3-java | <3.2.1-6ubuntu0.1~ | 3.2.1-6ubuntu0.1~ |
ubuntu/libcommons-collections3-java | <3.2.2 | 3.2.2 |
ubuntu/libcommons-collections4-java | <4.1 | 4.1 |
Oracle virtual desktop infrastructure | <=3.5.2 | |
Oracle WebLogic Server | =10.3.6.0.0 | |
Oracle WebLogic Server | =12.1.2.0.0 | |
Oracle WebLogic Server | =12.1.3.0.0 | |
Oracle WebLogic Server | =12.2.1.0.0 | |
Oracle WebLogic Server | ||
Oracle Virtual Desktop Infrastructure | <=3.5.2 | |
Oracle Storagetek Tape Analytics | =2.3 | |
<=3.5.2 | ||
=2.3 | ||
=10.3.6.0.0 | ||
=12.1.2.0.0 | ||
=12.1.3.0.0 | ||
=12.2.1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-4852 is considered critical due to its potential for remote code execution.
To fix CVE-2015-4852, you should upgrade to patched versions of Oracle WebLogic Server or the affected libraries if applicable.
CVE-2015-4852 affects Oracle WebLogic Server versions 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0.
Yes, CVE-2015-4852 can be exploited remotely by attackers to execute arbitrary code.
CVE-2015-4852 involves the WLS Security component in Oracle WebLogic Server and the Apache Commons library.