GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Thu Oct 06, 2016 3:26 pm Post subject: [ GLSA 201610-01 ] Groovy |
|
|
Gentoo Linux Security Advisory
Title: Groovy: Arbitrary code execution (GLSA 201610-01)
Severity: normal
Exploitable: remote
Date: October 06, 2016
Bug(s): #555470
ID: 201610-01
Synopsis
Groovy is vulnerable to a remote execution of arbitrary code when
java serialization is used.
Background
A multi-faceted language for the Java platform
Affected Packages
Package: dev-java/groovy
Vulnerable: < 2.4.5
Unaffected: >= 2.4.5
Architectures: All supported architectures
Description
Groovy’s MethodClosure class, in runtime/MethodClosure.java, is
vulnerable to a crafted serialized object.
Impact
Remote attackers could potentially execute arbitrary code, or cause
Denial of Service condition
Workaround
A workaround exists by using a custom security policy file utilizing the
standard Java security manager, or do not rely on serialization to
communicate remotely.
Resolution
All Groovy users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-java/groovy-2.4.5"
|
References
CVE-2015-3253 |
|