
====================================================================

                             CERT-Renater

                 Note d'Information No. 2018/VULN077
_____________________________________________________________________

DATE                : 27/02/2018

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache Geode versions 1 prior to
                                          1.4.0.

=====================================================================
http://mail-archives.apache.org/mod_mbox/www-announce/201802.mbox/%3cCAEwge-HwkgJoAUiCKj1S43OfcaU+47ZQkw+wkNmm0=JSH_Y5TA@mail.gmail.com%3e
http://mail-archives.apache.org/mod_mbox/www-announce/201802.mbox/%3cCAEwge-EA=armRcEHu5R3zZhyuTm=ZTLKHNJa5wPrsCYd3AeNfA@mail.gmail.com%3e
_____________________________________________________________________

CVE-2017-15693 Apache Geode unsafe deserialization of application objects

Severity:  Important

Vendor: The Apache Software Foundation

Versions Affected:  Apache Geode 1.0.0 through 1.3.0

Description:
The Geode server stores application objects in serialized form.
Certain cluster operations and API invocations cause these objects to
be deserialized.  An user with DATA:WRITE access to the cluster may be
able to cause remote code execution if certain classes are present on
the classpath.

Mitigation:
Users of the affected versions should upgrade to Apache Geode 1.4.0 or
later.  In addition, users should set the flags
validate-serializable-objects and serializable-object-filter.

Credit:
This issue was reported responsibly to the Apache Geode Security Team
by Man Yue Mo from Semmle.

References:
[1] https://issues.apache.org/jira/browse/GEODE-3923
[2]
https://cwiki.apache.org/confluence/display/GEODE/Release+Notes#ReleaseNotes-SecurityVulnerabilities

Mime 	

    Unnamed text/plain (inline, None, 966 bytes)

_____________________________________________________________________

CVE-2017-15692 Apache Geode unsafe deserialization in TcpServer

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Apache Geode 1.0.0 through 1.3.0

Description:
The TcpServer within the Geode locator opens a network port that
deserializes data. If an unprivileged user gains access to the Geode
locator, they may be able to cause remote code execution if certain
classes are present on the classpath.

A malicious user can send a network message to the Geode locator and
execute code if certain classes are present on the classpath.

Mitigation:
Users of the affected versions should upgrade to Apache Geode 1.4.0 or
later. In addition, users should set the flag
validate-serializable-objects.

Credit:
This issue was reported responsibly to the Apache Geode Security Team
by Man Yue Mo from Semmle.

References:
[1] https://issues.apache.org/jira/browse/GEODE-3923
[2]
https://cwiki.apache.org/confluence/display/GEODE/Release+Notes#ReleaseNotes-SecurityVulnerabilities

==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================





