Spring Framework CVE-2018-15756 Denial-Of-Service Vulnerability

Risk

Medium

Date Discovered

October 16, 2018

Description

Spring Framework is prone to a denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition; denying service to legitimate users. Spring Framework 5.0 through 5.0.9, 4.3 through 4.3.19 and 5.1 are vulnerable; other versions are also affected.

Technologies Affected

  • Oracle Agile PLM 9.3.3
  • Oracle Agile PLM 9.3.4
  • Oracle Agile PLM 9.3.5
  • Oracle Agile PLM 9.3.6
  • Oracle Communications Online Mediation Controller 6.1
  • Oracle Endeca Information Discovery Integrator 3.2.0
  • Oracle FLEXCUBE Private Banking 12.0.1
  • Oracle FLEXCUBE Private Banking 12.0.3
  • Oracle FLEXCUBE Private Banking 12.1.0
  • Oracle Financial Services Analytical Applications Infrastructure 8.0.2
  • Oracle Financial Services Analytical Applications Infrastructure 8.0.3
  • Oracle Financial Services Analytical Applications Infrastructure 8.0.4
  • Oracle Financial Services Analytical Applications Infrastructure 8.0.5
  • Oracle Financial Services Analytical Applications Infrastructure 8.0.6
  • Oracle Financial Services Analytical Applications Infrastructure 8.0.7
  • Oracle Financial Services Analytical Applications Infrastructure 8.0.8
  • Oracle GoldenGate Application Adapters 12.3.2.1.0
  • Oracle Insurance Calculation Engine 10.0
  • Oracle Insurance Calculation Engine 10.1
  • Oracle Insurance Calculation Engine 10.2
  • Oracle Insurance Calculation Engine 9.7
  • Oracle Insurance Policy Administration J2EE 10.0
  • Oracle Insurance Policy Administration J2EE 10.1
  • Oracle Insurance Policy Administration J2EE 11.0
  • Oracle Insurance Rules Palette 10.0
  • Oracle Insurance Rules Palette 10.1
  • Oracle Insurance Rules Palette 10.2
  • Oracle Insurance Rules Palette 11.0
  • Oracle MySQL Enterprise Monitor 4.0.7
  • Oracle MySQL Enterprise Monitor 4.0.8
  • Oracle MySQL Enterprise Monitor 4.0.9
  • Oracle MySQL Enterprise Monitor 8.0.13
  • Oracle MySQL Enterprise Monitor 8.0.14
  • Oracle Primavera Analytics 18.8
  • Oracle Primavera Gateway 15.2
  • Oracle Primavera Gateway 16.2
  • Oracle Primavera Gateway 17.12
  • Oracle Primavera Gateway 18.8
  • Oracle Retail Advanced Inventory Planning 15.0
  • Oracle Retail Financial Integration 14.0
  • Oracle Retail Financial Integration 14.1
  • Oracle Retail Financial Integration 15.0
  • Oracle Retail Financial Integration 16.0
  • Oracle Retail Integration Bus 15.0
  • Oracle Retail Integration Bus 16.0
  • Oracle Retail Invoice Matching 12.0
  • Oracle Retail Invoice Matching 13.0
  • Oracle Retail Invoice Matching 13.1
  • Oracle Retail Invoice Matching 13.2
  • Oracle Retail Invoice Matching 14.0
  • Oracle Retail Invoice Matching 14.1
  • Oracle Retail Order Broker 15.0
  • Oracle Retail Order Broker 16.0
  • Oracle Retail Order Broker 5.1
  • Oracle Retail Order Broker 5.2
  • Oracle WebCenter Sites 12.2.1.3.0
  • Oracle Weblogic Server 10.3.6.0
  • Oracle Weblogic Server 12.1.3.0
  • Oracle Weblogic Server 12.2.1.3.0
  • Pivotal Spring Framework 4.2.0
  • Pivotal Spring Framework 4.2.1
  • Pivotal Spring Framework 4.2.2
  • Pivotal Spring Framework 4.3
  • Pivotal Spring Framework 4.3.0
  • Pivotal Spring Framework 4.3.14
  • Pivotal Spring Framework 4.3.15
  • Pivotal Spring Framework 4.3.16
  • Pivotal Spring Framework 4.3.17
  • Pivotal Spring Framework 4.3.18
  • Pivotal Spring Framework 4.3.19
  • Pivotal Spring Framework 5.0.1
  • Pivotal Spring Framework 5.0.2
  • Pivotal Spring Framework 5.0.3
  • Pivotal Spring Framework 5.0.4
  • Pivotal Spring Framework 5.0.5
  • Pivotal Spring Framework 5.0.6
  • Pivotal Spring Framework 5.0.9
  • Pivotal Spring Framework 5.1

Recommendations

Block external access at the network boundary, unless external parties require service.
Filter access to the affected computer at the network boundary if global access isn't needed. Restricting access to only trusted computers and networks might greatly reduce the likelihood of a successful exploit.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of suspicious or anomalous activity. This may help detect attacks as well as malicious activity that may result from successful exploits of latent vulnerabilities.

Updates are available. Please see the references or vendor advisory for more information.

Credits

Nicholas Starke from Aruba Threat Labs.


© 1995- Symantec Corporation

Permission to redistribute this alert electronically is granted as long as it is not edited in any way unless authorized by Symantec Security Response. Reprinting the whole or part of this alert in any medium other than electronically requires permission from secure@symantec.com.

Disclaimer

The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.

Symantec, Symantec products, Symantec Security Response, and secure@symantec.com are registered trademarks of Symantec Corp. and/or affiliated companies in the United States and other countries. All other registered and unregistered trademarks represented in this document are the sole property of their respective companies/owners.