CVE-2016-6346
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
RESTEasy enables GZIPInterceptor, which allows remote attackers to cause a denial of service via unspecified vectors.
RESTEasy habilita GZIPInterceptor, lo que permite a atacantes remotos provocar una denegación de servicio a través de vectores no especificados.
It was found that GZIPInterceptor is enabled when not necessarily required in RESTEasy. An attacker could use this flaw to launch a Denial of Service attack.
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release of Red Hat JBoss Enterprise Application Platform 6.4.14 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.13, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group. On systems using classic /etc/init.d init scripts, the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-07-26 CVE Reserved
- 2016-09-07 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/92744 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2017-0517.html | 2019-05-14 | |
http://rhn.redhat.com/errata/RHSA-2017-0826.html | 2019-05-14 | |
http://rhn.redhat.com/errata/RHSA-2017-0827.html | 2019-05-14 | |
http://rhn.redhat.com/errata/RHSA-2017-0828.html | 2019-05-14 | |
http://rhn.redhat.com/errata/RHSA-2017-0829.html | 2019-05-14 | |
https://access.redhat.com/errata/RHSA-2017:1675 | 2019-05-14 | |
https://access.redhat.com/errata/RHSA-2017:1676 | 2019-05-14 | |
https://access.redhat.com/errata/RHSA-2018:0002 | 2019-05-14 | |
https://access.redhat.com/errata/RHSA-2018:0003 | 2019-05-14 | |
https://access.redhat.com/errata/RHSA-2018:0004 | 2019-05-14 | |
https://access.redhat.com/errata/RHSA-2018:0005 | 2019-05-14 | |
https://access.redhat.com/errata/RHSA-2018:2143 | 2019-05-14 | |
https://access.redhat.com/errata/RHSA-2019:1222 | 2019-05-14 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1372120 | 2019-05-14 | |
https://access.redhat.com/security/cve/CVE-2016-6346 | 2019-05-14 |