MGASA-2016-0406

Source
https://advisories.mageia.org/MGASA-2016-0406.html
Import Source
https://advisories.mageia.org/MGASA-2016-0406.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0406
Related
Published
2016-11-30T08:07:23Z
Modified
2016-11-30T07:51:48Z
Summary
Updated jenkins-remoting packages fix security vulnerability
Details

An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java object to the Jenkins CLI, making Jenkins connect to an attacker-controlled LDAP server, which in turn can send a serialized payload leading to code execution, bypassing existing protection mechanisms. (CVE-2016-9299)

References
Credits

Affected packages

Mageia:5 / jenkins-remoting

Package

Name
jenkins-remoting
Purl
pkg:rpm/mageia/jenkins-remoting?arch=source&distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.53.4-1.mga5

Ecosystem specific

{
    "section": "core"
}