BDU:2021-05499
Vulnerability from fstec - Published: 12.03.2021
VLAI Severity ?
Title
Уязвимость Java-библиотеки Xstream для преобразования объектов в форматы XML или JSON, связанная с неограниченной загрузкой файлов опасного типа, позволяющая нарушителю загружать и выполнять произвольный код с удаленного хоста
Description
Уязвимость Java-библиотеки Xstream для преобразования объектов в форматы XML или JSON связана с неограниченной загрузкой файлов опасного типа. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, загружать и выполнять произвольный код с удаленного хоста путем манипулирования обработанным входным потоком данных
Severity ?
Vendor
Red Hat Inc., Сообщество свободного программного обеспечения, Canonical Ltd., Oracle Corp., Novell Inc., Fedora Project, Xstream Project, Apache Software Foundation, McAfee Inc.
Software Name
Red Hat Enterprise Linux, Debian GNU/Linux, Ubuntu, Oracle Communications Unified Inventory Management, Red Hat JBoss Fuse, Red Hat Descision Manager, openSUSE Tumbleweed, Red Hat JBoss Data Virtualization, Red Hat BPM Suite, Red Hat JBoss Data Grid, OpenSUSE Leap, Red Hat Process Automation, Fedora, Oracle Business Activity Monitoring, Oracle Banking Platform, Red Hat Integration Camel K, Red Hat Integration Camel Quarkus, XStream, Log4j, Oracle Communications BRM, Oracle Banking Enterprise Default Management, Oracle Retail Xstore Point of Service, Oracle Communications Policy Management, Oracle Banking Virtual Account Management, Red Hat Data Grid, Red Hat CodeReady Studio, Red Hat JBoss A-MQ, Red Hat JBoss BRMS, Red Hat JBoss Fuse Service Works, Red Hat JBoss SOA Platform, Oracle WebCenter Portal, McAfee Web Gateway
Software Version
7 (Red Hat Enterprise Linux), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 7.3.2 (Oracle Communications Unified Inventory Management), 7.3.4 (Oracle Communications Unified Inventory Management), 7.3.5 (Oracle Communications Unified Inventory Management), 7.4.0 (Oracle Communications Unified Inventory Management), 7 (Red Hat JBoss Fuse), 6 (Red Hat JBoss Fuse), 7 (Red Hat Descision Manager), - (openSUSE Tumbleweed), 6 (Red Hat JBoss Data Virtualization), 6 (Red Hat BPM Suite), 20.04 LTS (Ubuntu), 20.10 (Ubuntu), 7 (Red Hat JBoss Data Grid), 15.2 (OpenSUSE Leap), 7 (Red Hat Process Automation), 33 (Fedora), 21.04 (Ubuntu), 11.1.1.9.0 (Oracle Business Activity Monitoring), 12.2.1.3.0 (Oracle Business Activity Monitoring), 34 (Fedora), 2.4.0 (Oracle Banking Platform), 2.7.1 (Oracle Banking Platform), 2.9.0 (Oracle Banking Platform), - (Red Hat Integration Camel K), 15.3 (OpenSUSE Leap), - (Red Hat Integration Camel Quarkus), 35 (Fedora), до 1.4.16 (XStream), до 5.17.0 (Log4j), 12.0.0.3.0 (Oracle Communications BRM), 2.10.0 (Oracle Banking Enterprise Default Management), 2.12.0 (Oracle Banking Enterprise Default Management), 12.2.1.4.0 (Oracle Business Activity Monitoring), 16.0.6 (Oracle Retail Xstore Point of Service), 17.0.4 (Oracle Retail Xstore Point of Service), 18.0.3 (Oracle Retail Xstore Point of Service), 19.0.2 (Oracle Retail Xstore Point of Service), 12.5.0 (Oracle Communications Policy Management), 14.2 (Oracle Banking Virtual Account Management), 14.3 (Oracle Banking Virtual Account Management), 14.5 (Oracle Banking Virtual Account Management), 8 (Red Hat Data Grid), 12 (Red Hat CodeReady Studio), 6 (Red Hat JBoss A-MQ), 5 (Red Hat JBoss BRMS), 6 (Red Hat JBoss BRMS), 6 (Red Hat JBoss Fuse Service Works), 5 (Red Hat JBoss SOA Platform), 7.4.1 (Oracle Communications Unified Inventory Management), 2.12.0 (Oracle Banking Platform), 11.1.1.9.0 (Oracle WebCenter Portal), 12.2.1.3.0 (Oracle WebCenter Portal), 12.2.1.4.0 (Oracle WebCenter Portal), до 8.2.22 (McAfee Web Gateway)
Possible Mitigations
Использование рекомендаций:
Для xstream:
https://x-stream.github.io/security.html#workaround
https://x-stream.github.io/CVE-2021-21344.html
Для Debian GNU/Linux:
https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html
Для Apache:
https://lists.apache.org/thread/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3cusers.activemq.apache.org%3e
https://issues.apache.org/jira/browse/AMQ-7426
Для Ubuntu:
https://ubuntu.com/security/CVE-2021-21344
https://ubuntu.com/security/notices/USN-4943-1
Для Fedora:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/
Для программных продуктов Oracle Corp.:
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/cve-2021-21344
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2021-21344.html
Для McAfee Inc.:
https://docs.mcafee.com/ru-RU/bundle/web-gateway-8.2.x-release-notes/page/GUID-66AC8C57-9C6E-4785-994A-641F156C0E0B.html
Reference
http://x-stream.github.io/changes.html#1.4.16
https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3
https://x-stream.github.io/security.html#workaround
https://x-stream.github.io/CVE-2021-21344.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html
https://lists.apache.org/thread/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3cusers.activemq.apache.org%3e
https://issues.apache.org/jira/browse/AMQ-7426
https://ubuntu.com/security/CVE-2021-21344
https://ubuntu.com/security/notices/USN-4943-1
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://access.redhat.com/security/cve/cve-2021-21344
https://www.suse.com/security/cve/CVE-2021-21344.html
https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/
https://docs.mcafee.com/ru-RU/bundle/web-gateway-8.2.x-release-notes/page/GUID-66AC8C57-9C6E-4785-994A-641F156C0E0B.html
CWE
CWE-434, CWE-502
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Canonical Ltd., Oracle Corp., Novell Inc., Fedora Project, Xstream Project, Apache Software Foundation, McAfee Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7 (Red Hat Enterprise Linux), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 7.3.2 (Oracle Communications Unified Inventory Management), 7.3.4 (Oracle Communications Unified Inventory Management), 7.3.5 (Oracle Communications Unified Inventory Management), 7.4.0 (Oracle Communications Unified Inventory Management), 7 (Red Hat JBoss Fuse), 6 (Red Hat JBoss Fuse), 7 (Red Hat Descision Manager), - (openSUSE Tumbleweed), 6 (Red Hat JBoss Data Virtualization), 6 (Red Hat BPM Suite), 20.04 LTS (Ubuntu), 20.10 (Ubuntu), 7 (Red Hat JBoss Data Grid), 15.2 (OpenSUSE Leap), 7 (Red Hat Process Automation), 33 (Fedora), 21.04 (Ubuntu), 11.1.1.9.0 (Oracle Business Activity Monitoring), 12.2.1.3.0 (Oracle Business Activity Monitoring), 34 (Fedora), 2.4.0 (Oracle Banking Platform), 2.7.1 (Oracle Banking Platform), 2.9.0 (Oracle Banking Platform), - (Red Hat Integration Camel K), 15.3 (OpenSUSE Leap), - (Red Hat Integration Camel Quarkus), 35 (Fedora), \u0434\u043e 1.4.16 (XStream), \u0434\u043e 5.17.0 (Log4j), 12.0.0.3.0 (Oracle Communications BRM), 2.10.0 (Oracle Banking Enterprise Default Management), 2.12.0 (Oracle Banking Enterprise Default Management), 12.2.1.4.0 (Oracle Business Activity Monitoring), 16.0.6 (Oracle Retail Xstore Point of Service), 17.0.4 (Oracle Retail Xstore Point of Service), 18.0.3 (Oracle Retail Xstore Point of Service), 19.0.2 (Oracle Retail Xstore Point of Service), 12.5.0 (Oracle Communications Policy Management), 14.2 (Oracle Banking Virtual Account Management), 14.3 (Oracle Banking Virtual Account Management), 14.5 (Oracle Banking Virtual Account Management), 8 (Red Hat Data Grid), 12 (Red Hat CodeReady Studio), 6 (Red Hat JBoss A-MQ), 5 (Red Hat JBoss BRMS), 6 (Red Hat JBoss BRMS), 6 (Red Hat JBoss Fuse Service Works), 5 (Red Hat JBoss SOA Platform), 7.4.1 (Oracle Communications Unified Inventory Management), 2.12.0 (Oracle Banking Platform), 11.1.1.9.0 (Oracle WebCenter Portal), 12.2.1.3.0 (Oracle WebCenter Portal), 12.2.1.4.0 (Oracle WebCenter Portal), \u0434\u043e 8.2.22 (McAfee Web Gateway)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f xstream:\nhttps://x-stream.github.io/security.html#workaround\nhttps://x-stream.github.io/CVE-2021-21344.html\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://lists.debian.org/debian-lts-announce/2021/04/msg00002.html\n\n\u0414\u043b\u044f Apache:\nhttps://lists.apache.org/thread/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3cusers.activemq.apache.org%3e\nhttps://issues.apache.org/jira/browse/AMQ-7426\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/CVE-2021-21344\nhttps://ubuntu.com/security/notices/USN-4943-1\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Oracle Corp.:\nhttps://www.oracle.com//security-alerts/cpujul2021.html\nhttps://www.oracle.com/security-alerts/cpuoct2021.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2021-21344\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2021-21344.html\n\n\u0414\u043b\u044f McAfee Inc.:\nhttps://docs.mcafee.com/ru-RU/bundle/web-gateway-8.2.x-release-notes/page/GUID-66AC8C57-9C6E-4785-994A-641F156C0E0B.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "12.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "17.11.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "17.11.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-05499",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-21344",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, Ubuntu, Oracle Communications Unified Inventory Management, Red Hat JBoss Fuse, Red Hat Descision Manager, openSUSE Tumbleweed, Red Hat JBoss Data Virtualization, Red Hat BPM Suite, Red Hat JBoss Data Grid, OpenSUSE Leap, Red Hat Process Automation, Fedora, Oracle Business Activity Monitoring, Oracle Banking Platform, Red Hat Integration Camel K, Red Hat Integration Camel Quarkus, XStream, Log4j, Oracle Communications BRM, Oracle Banking Enterprise Default Management, Oracle Retail Xstore Point of Service, Oracle Communications Policy Management, Oracle Banking Virtual Account Management, Red Hat Data Grid, Red Hat CodeReady Studio, Red Hat JBoss A-MQ, Red Hat JBoss BRMS, Red Hat JBoss Fuse Service Works, Red Hat JBoss SOA Platform, Oracle WebCenter Portal, McAfee Web Gateway",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 7 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Canonical Ltd. Ubuntu 18.04 LTS , Canonical Ltd. Ubuntu 20.04 LTS , Canonical Ltd. Ubuntu 20.10 , Novell Inc. OpenSUSE Leap 15.2 , Fedora Project Fedora 33 , Canonical Ltd. Ubuntu 21.04 , Fedora Project Fedora 34 , Novell Inc. OpenSUSE Leap 15.3 , Fedora Project Fedora 35 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Java-\u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Xstream \u0434\u043b\u044f \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0431\u044a\u0435\u043a\u0442\u043e\u0432 \u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u044b XML \u0438\u043b\u0438 JSON, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0439 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u043e\u0439 \u0444\u0430\u0439\u043b\u043e\u0432 \u043e\u043f\u0430\u0441\u043d\u043e\u0433\u043e \u0442\u0438\u043f\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0445\u043e\u0441\u0442\u0430",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u0430\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0444\u0430\u0439\u043b\u043e\u0432 \u043e\u043f\u0430\u0441\u043d\u043e\u0433\u043e \u0442\u0438\u043f\u0430 (CWE-434), \u0412\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u043e\u0432\u0435\u0440\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-502)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Java-\u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Xstream \u0434\u043b\u044f \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0431\u044a\u0435\u043a\u0442\u043e\u0432 \u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u044b XML \u0438\u043b\u0438 JSON \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0439 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u043e\u0439 \u0444\u0430\u0439\u043b\u043e\u0432 \u043e\u043f\u0430\u0441\u043d\u043e\u0433\u043e \u0442\u0438\u043f\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0445\u043e\u0441\u0442\u0430 \u043f\u0443\u0442\u0435\u043c \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u044b\u043c \u0432\u0445\u043e\u0434\u043d\u044b\u043c \u043f\u043e\u0442\u043e\u043a\u043e\u043c \u0434\u0430\u043d\u043d\u044b\u0445",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445, \u0417\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u043e\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://x-stream.github.io/changes.html#1.4.16\nhttps://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3\nhttps://x-stream.github.io/security.html#workaround\nhttps://x-stream.github.io/CVE-2021-21344.html\nhttps://lists.debian.org/debian-lts-announce/2021/04/msg00002.html\nhttps://lists.apache.org/thread/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3cusers.activemq.apache.org%3e\nhttps://issues.apache.org/jira/browse/AMQ-7426\nhttps://ubuntu.com/security/CVE-2021-21344\nhttps://ubuntu.com/security/notices/USN-4943-1\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/\nhttps://www.oracle.com//security-alerts/cpujul2021.html\nhttps://www.oracle.com/security-alerts/cpuoct2021.html\nhttps://access.redhat.com/security/cve/cve-2021-21344\nhttps://www.suse.com/security/cve/CVE-2021-21344.html\nhttps://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/\nhttps://docs.mcafee.com/ru-RU/bundle/web-gateway-8.2.x-release-notes/page/GUID-66AC8C57-9C6E-4785-994A-641F156C0E0B.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u044b\u0445 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0437\u0430\u0449\u0438\u0442\u044b",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-434, CWE-502",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,8)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…