漏洞信息详情
XStream 输入验证错误漏洞
漏洞简介
XStream是XStream团队的一个轻量级的、简单易用的开源Java类库,它主要用于将对象序列化成XML(JSON)或反序列化为对象。
XStream 1.4.9及之前的版本中存在输入验证错误漏洞。该漏洞源于网络系统或产品未对输入的数据进行正确的验证。
漏洞公告
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
http://x-stream.github.io/CVE-2017-7957.html
参考网址
来源:DEBIAN
链接:http://www.debian.org/security/2017/dsa-3841
来源:BID
链接:http://www.securityfocus.com/bid/100687
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2017:1832
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2017:2889
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2017:2888
来源:CONFIRM
链接:http://x-stream.github.io/CVE-2017-7957.html
来源:CONFIRM
链接:https://www-prd-trops.events.ibm.com/node/715749
来源:XF
链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/125800
来源:SECTRACK
链接:http://www.securitytracker.com/id/1039499
来源:www.ibm.com
链接:https://www.ibm.com/support/docview.wss?uid=ibm10967469
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10872142
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191006-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/75922
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-identified-in-ibm-storediq/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-guardium-data-encryption-gde-3/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/79634
来源:www-01.ibm.com
链接:https://www-01.ibm.com/support/docview.wss?uid=ibm10872142
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3165/
受影响实体
- Xstream_project Xstream:1.4.9<!--2000-1-1-->
补丁
- XStream 安全漏洞的修复措施<!--2017-4-20-->
还没有评论,来说两句吧...