CVE-2017-3249
Summary
| CVE | CVE-2017-3249 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-01-27 22:59:00 UTC |
| Updated | 2017-01-31 13:39:00 UTC |
| Description | Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via LDAP to compromise Oracle GlassFish Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle GlassFish Server accessible data as well as unauthorized read access to a subset of Oracle GlassFish Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle GlassFish Server. CVSS v3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Oracle | Glassfish Server | 2.1.1 | All | All | All |
| Application | Oracle | Glassfish Server | 3.0.1 | All | All | All |
| Application | Oracle | Glassfish Server | 3.1.2 | All | All | All |
| Application | Oracle | Glassfish Server | 2.1.1 | All | All | All |
| Application | Oracle | Glassfish Server | 3.0.1 | All | All | All |
| Application | Oracle | Glassfish Server | 3.1.2 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Oracle Critical Patch Update - January 2017 | CONFIRM | www.oracle.com | Patch, Vendor Advisory |
| Oracle GlassFish Server CVE-2017-3249 Remote Security Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.