Vulnerability Description
EC2 Amazon Machine Image (AMI) in JBoss Enterprise Application Platform (EAP) 5.1.2 uses 755 permissions for /var/cache/jboss-ec2-eap/, which allows local users to read sensitive information such as Amazon Web Services (AWS) credentials by reading files in the directory.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Jboss Enterprise Application Platform | 5.1.2 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2012-1376.htmlVendor Advisory
- http://secunia.com/advisories/51016Vendor Advisory
- http://www.osvdb.org/86409
- http://www.securityfocus.com/bid/55945
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79398
- http://rhn.redhat.com/errata/RHSA-2012-1376.htmlVendor Advisory
- http://secunia.com/advisories/51016Vendor Advisory
- http://www.osvdb.org/86409
- http://www.securityfocus.com/bid/55945
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79398
FAQ
What is CVE-2012-3427?
CVE-2012-3427 is a vulnerability with a CVSS score of 2.1 (LOW). EC2 Amazon Machine Image (AMI) in JBoss Enterprise Application Platform (EAP) 5.1.2 uses 755 permissions for /var/cache/jboss-ec2-eap/, which allows local users to read sensitive information such as A...
How severe is CVE-2012-3427?
CVE-2012-3427 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-3427?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Jboss Enterprise Application Platform.