First published: Fri Jan 27 2017(Updated: )
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Core). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via SMTP to compromise Oracle GlassFish Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle GlassFish Server accessible data. CVSS v3.0 Base Score 4.3 (Integrity impacts).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle GlassFish Enterprise Server | =2.1.1 | |
Oracle GlassFish Enterprise Server | =3.0.1 | |
Oracle GlassFish Enterprise Server | =3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3247 is classified as a high severity vulnerability due to its potential for exploitation by unauthenticated attackers.
To remediate CVE-2017-3247, update Oracle GlassFish Server to the latest version that addresses this vulnerability.
The affected versions of Oracle GlassFish Server include 2.1.1, 3.0.1, and 3.1.2.
CVE-2017-3247 can be exploited by an unauthenticated attacker with network access via SMTP.
CVE-2017-3247 impacts the Oracle GlassFish Server component of Oracle Fusion Middleware.