Executive Summary

Summary
Titlejackson-databind security update
Informations
NameDSA-4542First vendor Publication2019-10-06
VendorDebianLast vendor Modification2019-10-06
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

It was discovered that jackson-databind, a Java library used to parse JSON and other data formats, did not properly validate user input before attempting deserialization. This allowed an attacker providing maliciously crafted input to perform code execution, or read arbitrary files on the server.

For the oldstable distribution (stretch), these problems have been fixed in version 2.8.6-1+deb9u6.

For the stable distribution (buster), these problems have been fixed in version 2.9.8-3+deb10u1.

We recommend that you upgrade your jackson-databind packages.

For the detailed security status of jackson-databind please refer to its security tracker page at: https://security-tracker.debian.org/tracker/jackson-databind

Original Source

Url : http://www.debian.org/security/2019/dsa-4542

CWE : Common Weakness Enumeration

%idName
67 %CWE-20Improper Input Validation
17 %CWE-502Deserialization of Untrusted Data
17 %CWE-200Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application128
Os3
Os5

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2019-10-06 13:18:56
  • First insertion