cnvd-2015-08298
Vulnerability from cnvd

Title: 多款Cisco产品Apache Commons Collections库任意代码执行漏洞

Description:

Apache Commons Collections(ACC)是美国阿帕奇(Apache)软件基金会的一个Apache Commons项目的Commons Proper(可重复利用Java组件库)中的组件,它可以扩展或增加Java集合框架。

多款Cisco产品的ACC库中使用的Java反序列化过程中存在安全漏洞。远程攻击者可通过提交特制的输入利用该漏洞执行任意代码。

Severity:

Patch Name: 多款Cisco产品Apache Commons Collections库任意代码执行漏洞的补丁

Patch Description:

Apache Commons Collections(ACC)是美国阿帕奇(Apache)软件基金会的一个Apache Commons项目的Commons Proper(可重复利用Java组件库)中的组件,它可以扩展或增加Java集合框架。

多款Cisco产品的ACC库中使用的Java反序列化过程中存在安全漏洞。远程攻击者可通过提交特制的输入利用该漏洞执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

用户可参考如下供应商提供的安全公告获得补丁信息: http://www.cisco.com/

Reference: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization

Impacted products
Name
['Cisco Jabber for Windows', 'Cisco IOS Software', 'Cisco Wireless Control System (WCS)', 'Cisco Unity Connection', 'Cisco Identity Services Engine (ISE)', 'Cisco Prime Infrastructure', 'Cisco Enterprise Content Delivery System (ECDS)', 'Cisco Prime Collaboration Assurance']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "78872"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2015-6420"
    }
  },
  "description": "Apache Commons Collections\uff08ACC\uff09\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u8f6f\u4ef6\u57fa\u91d1\u4f1a\u7684\u4e00\u4e2aApache Commons\u9879\u76ee\u7684Commons Proper\uff08\u53ef\u91cd\u590d\u5229\u7528Java\u7ec4\u4ef6\u5e93\uff09\u4e2d\u7684\u7ec4\u4ef6\uff0c\u5b83\u53ef\u4ee5\u6269\u5c55\u6216\u589e\u52a0Java\u96c6\u5408\u6846\u67b6\u3002\r\n\r\n\u591a\u6b3eCisco\u4ea7\u54c1\u7684ACC\u5e93\u4e2d\u4f7f\u7528\u7684Java\u53cd\u5e8f\u5217\u5316\u8fc7\u7a0b\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u63d0\u4ea4\u7279\u5236\u7684\u8f93\u5165\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
  "discovererName": "Gabriel Lawrence and Chris Frohoff",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttp://www.cisco.com/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2015-08298",
  "openTime": "2015-12-17",
  "patchDescription": "Apache Commons Collections\uff08ACC\uff09\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u8f6f\u4ef6\u57fa\u91d1\u4f1a\u7684\u4e00\u4e2aApache Commons\u9879\u76ee\u7684Commons Proper\uff08\u53ef\u91cd\u590d\u5229\u7528Java\u7ec4\u4ef6\u5e93\uff09\u4e2d\u7684\u7ec4\u4ef6\uff0c\u5b83\u53ef\u4ee5\u6269\u5c55\u6216\u589e\u52a0Java\u96c6\u5408\u6846\u67b6\u3002\r\n\r\n\u591a\u6b3eCisco\u4ea7\u54c1\u7684ACC\u5e93\u4e2d\u4f7f\u7528\u7684Java\u53cd\u5e8f\u5217\u5316\u8fc7\u7a0b\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u63d0\u4ea4\u7279\u5236\u7684\u8f93\u5165\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eCisco\u4ea7\u54c1Apache Commons Collections\u5e93\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Cisco Jabber for Windows",
      "Cisco IOS Software",
      "Cisco Wireless Control System (WCS)",
      "Cisco Unity Connection",
      "Cisco Identity Services Engine (ISE)",
      "Cisco Prime Infrastructure",
      "Cisco Enterprise Content Delivery System (ECDS)",
      "Cisco Prime Collaboration Assurance"
    ]
  },
  "referenceLink": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization",
  "serverity": "\u9ad8",
  "submitTime": "2015-12-16",
  "title": "\u591a\u6b3eCisco\u4ea7\u54c1Apache Commons Collections\u5e93\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…