Bug 1660263 (CVE-2019-3805) - CVE-2019-3805 wildfly: Race condition on PID file allows for termination of arbitrary processes by local users
Summary: CVE-2019-3805 wildfly: Race condition on PID file allows for termination of a...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-3805
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1645008
TreeView+ depends on / blocked
 
Reported: 2018-12-18 01:01 UTC by Sam Fowler
Modified: 2021-03-04 13:33 UTC (History)
99 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2019-06-10 10:44:03 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2019:1106 0 None None None 2019-05-08 12:04:15 UTC
Red Hat Product Errata RHSA-2019:1107 0 None None None 2019-05-08 12:09:18 UTC
Red Hat Product Errata RHSA-2019:1108 0 None None None 2019-05-08 12:11:40 UTC
Red Hat Product Errata RHSA-2019:1140 0 None None None 2019-05-09 18:14:57 UTC
Red Hat Product Errata RHSA-2019:2413 0 None None None 2019-08-08 10:08:44 UTC
Red Hat Product Errata RHSA-2020:0727 0 None None None 2020-03-05 12:53:47 UTC
Red Hat Product Errata RHSA-2020:2565 0 None None None 2020-06-15 16:18:05 UTC

Description Sam Fowler 2018-12-18 01:01:07 UTC
JBoss EAP has a vulnerability that allows local users who are able to execute init.d script to terminate arbitrary process on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.

Comment 5 Chess Hazlett 2019-04-30 17:35:00 UTC
Acknowledgments:

Name: Daniel Le Gall (SCRT Information Security)

Comment 6 errata-xmlrpc 2019-05-08 12:04:12 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2019:1106 https://access.redhat.com/errata/RHSA-2019:1106

Comment 7 errata-xmlrpc 2019-05-08 12:09:15 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 6

Via RHSA-2019:1107 https://access.redhat.com/errata/RHSA-2019:1107

Comment 8 errata-xmlrpc 2019-05-08 12:11:37 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 7

Via RHSA-2019:1108 https://access.redhat.com/errata/RHSA-2019:1108

Comment 9 errata-xmlrpc 2019-05-09 18:14:54 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.3.1 zip

Via RHSA-2019:1140 https://access.redhat.com/errata/RHSA-2019:1140

Comment 10 Joshua Padman 2019-05-15 22:53:18 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat JBoss Fuse 6
 * Red Hat JBoss Fuse Service Works 6
 * Red Hat JBoss Data Virtualization & Services 6

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 12 Paramvir jindal 2019-07-19 05:22:28 UTC
JDG 7.3.2 (latest version as of today) is affected. Creating Tracker.

Comment 15 errata-xmlrpc 2019-08-08 10:08:42 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.4.0

Via RHSA-2019:2413 https://access.redhat.com/errata/RHSA-2019:2413

Comment 16 errata-xmlrpc 2020-03-05 12:53:44 UTC
This issue has been addressed in the following products:

  Red Hat Data Grid 7.3.3

Via RHSA-2020:0727 https://access.redhat.com/errata/RHSA-2020:0727

Comment 17 errata-xmlrpc 2020-06-15 16:18:01 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2020:2565 https://access.redhat.com/errata/RHSA-2020:2565


Note You need to log in before you can comment on or make changes to this bug.