Rapid7 Vulnerability & Exploit Database

CentOS Linux: CVE-2019-12384: Important: pki-deps:10.6 security update (CESA-2019:2720)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

CentOS Linux: CVE-2019-12384: Important: pki-deps:10.6 security update (CESA-2019:2720)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
06/24/2019
Created
09/13/2019
Added
09/12/2019
Modified
05/25/2023

Description

FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.

Solution(s)

  • centos-upgrade-apache-commons-collections
  • centos-upgrade-apache-commons-lang
  • centos-upgrade-bea-stax-api
  • centos-upgrade-glassfish-fastinfoset
  • centos-upgrade-glassfish-jaxb-api
  • centos-upgrade-glassfish-jaxb-core
  • centos-upgrade-glassfish-jaxb-runtime
  • centos-upgrade-glassfish-jaxb-txw2
  • centos-upgrade-jackson-annotations
  • centos-upgrade-jackson-core
  • centos-upgrade-jackson-databind
  • centos-upgrade-jackson-jaxrs-json-provider
  • centos-upgrade-jackson-jaxrs-providers
  • centos-upgrade-jackson-module-jaxb-annotations
  • centos-upgrade-jakarta-commons-httpclient
  • centos-upgrade-javassist
  • centos-upgrade-javassist-javadoc
  • centos-upgrade-pki-servlet-4-0-api
  • centos-upgrade-pki-servlet-container
  • centos-upgrade-python-nss-debugsource
  • centos-upgrade-python-nss-doc
  • centos-upgrade-python3-nss
  • centos-upgrade-python3-nss-debuginfo
  • centos-upgrade-relaxngdatatype
  • centos-upgrade-resteasy
  • centos-upgrade-slf4j
  • centos-upgrade-slf4j-jdk14
  • centos-upgrade-stax-ex
  • centos-upgrade-velocity
  • centos-upgrade-xalan-j2
  • centos-upgrade-xerces-j2
  • centos-upgrade-xml-commons-apis
  • centos-upgrade-xml-commons-resolver
  • centos-upgrade-xmlstreambuffer
  • centos-upgrade-xsom

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;