October 2014 Java Runtime Environment (JRE) Vulnerabilities in Multiple NetApp Products
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
Subscribe to NTAP-20141023-0001 updates
Subscribe to NTAP-20141023-0001 advisory updates
Unsubscribe from NTAP-20141023-0001 advisory updates
Unsubscribe from NTAP-20141023-0001 advisory updates
Advisory ID: NTAP-20141023-0001 Version: 20.0 Last updated: 03/22/2017 Status: Final. CVEs: CVE-2014-6513, CVE-2014-6532, CVE-2014-6503, CVE-2014-6456, CVE-2014-6562, CVE-2014-6485, CVE-2014-6492, CVE-2014-6493, CVE-2014-4288, CVE-2014-6466, CVE-2014-6458, CVE-2014-6468, CVE-2014-6506, CVE-2014-6511, CVE-2014-6476, CVE-2014-6515, CVE-2014-6504, CVE-2014-6519, CVE-2014-6517, CVE-2014-6531, CVE-2014-6512, CVE-2014-6457, CVE-2014-6527, CVE-2014-6502, CVE-2014-6558
Summary
Multiple NetApp products incorporate the Java Runtime Environment (JRE) software libraries. JRE versions up to 8u25, 7u72 and 6u85 are susceptible to multiple vulnerabilites. This advisory will be updated as additional information becomes available.
Impact
Exploitation of this vulnerability may lead to unauthenticated network attacks, unauthorized update, insert or delete access to some Java SE, Java SE Embedded accessible data, or unauthenticated Operating System takeover including arbitrary code execution.
Vulnerability Scoring Details
CVE | Score | Vector |
---|---|---|
CVE-2014-4288 | 6.5 (MEDIUM) | AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C |
CVE-2014-6456 | 7.9 (HIGH) | AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C |
CVE-2014-6457 | 3.4 (LOW) | AV:N/AC:H/Au:N/C:N/I:P/A:P/E:U/RL:U/RC:C |
CVE-2014-6458 | 5.9 (MEDIUM) | AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C |
CVE-2014-6466 | 5.9 (MEDIUM) | AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C |
CVE-2014-6468 | 5.8 (MEDIUM) | AV:N/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:U/RC:C |
CVE-2014-6476 | 4.3 (MEDIUM) | AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:C |
CVE-2014-6485 | 7.9 (HIGH) | AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C |
CVE-2014-6492 | 6.5 (MEDIUM) | AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C |
CVE-2014-6493 | 6.5 (MEDIUM) | AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C |
CVE-2014-6502 | 2.2 (LOW) | AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:C |
CVE-2014-6503 | 7.9 (HIGH) | AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C |
CVE-2014-6504 | 4.3 (MEDIUM) | AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:C |
CVE-2014-6506 | 5.8 (MEDIUM) | AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:C |
CVE-2014-6511 | 4.3 (MEDIUM) | AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:C |
CVE-2014-6512 | 3.7 (LOW) | AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:C |
CVE-2014-6513 | 8.5 (HIGH) | AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C |
CVE-2014-6515 | 4.3 (MEDIUM) | AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:C |
CVE-2014-6517 | 4.3 (MEDIUM) | AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:C |
CVE-2014-6519 | 4.3 (MEDIUM) | AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:C |
CVE-2014-6527 | 2.2 (LOW) | AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:C |
CVE-2014-6531 | 3.7 (LOW) | AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:C |
CVE-2014-6532 | 7.9 (HIGH) | AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C |
CVE-2014-6558 | 2.2 (LOW) | AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:C |
CVE-2014-6562 | 7.9 (HIGH) | AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C |
Exploitation and Public Announcements
NetApp is aware of public discussion of this vulnerability.
References
- https://support.oracle.com/epmos/faces/DocumentDisplay?id=1931846.1&_adf.ctrl-state=u4wgyjryo_118&_afrLoop=335186493122608
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html#AppendixJAVA
- http://www.oracle.com/technetwork/java/javase/8u25-relnotes-2296185.html
- http://www.oracle.com/technetwork/java/javase/7u71-relnotes-2296187.html
- http://www.oracle.com/technetwork/java/javase/7u72-relnotes-2296190.html
- http://www.oracle.com/technetwork/java/javase/documentation/overview-156328.html
Affected Products
- 7-Mode Transition Tool
- Cloud Manager
- MetroCluster Plug-in for vSphere
- NetApp VASA Provider for Clustered Data ONTAP 9.7 and above
- NetApp VASA Provider for Data ONTAP operating in 7-Mode
- OnCommand Balance
- OnCommand Insight
- OnCommand Report
- OnCommand Unified Manager Core Package
- OnCommand Unified Manager Host Package
- OnCommand Workflow Automation
- SnapManager for Oracle
- SnapManager for SAP
- Virtual Storage Console for VMware vSphere 9.7 and above
Products Not Affected
- ATTO FibreBridge - 6500N
- Brocade Fabric Operating System Firmware
- Clustered Data ONTAP
- Clustered Data ONTAP Antivirus Connector
- E-Series SANtricity Storage Manager
- E-Series SANtricity Web Services (REST API) for Web Services Proxy
- FAS/AFF BIOS
- Host Utilities - SAN for Linux
- Host Utilities - SAN for Windows
- NetApp Cloud Backup (formerly AltaVault)
- NetApp Manageability SDK
- NetApp NFS Plug-in for VMware VAAI
- NetApp SANtricity SMI-S Provider
- NetApp SMI-S Provider
- NetApp Storage Encryption
- OnCommand Performance Manager (Unified Manager Performance Pkg)
- OnCommand Plug-in for Microsoft
- OnCommand Unified Manager for Clustered Data ONTAP
- Open Systems SnapVault Agent
- RapidData Migration Solution
- Service Processor
- Single Mailbox Recovery
- Snap Creator Framework
- SnapDrive for Unix
- SnapManager for Exchange
- SnapManager for Hyper-V
- SnapManager for Sharepoint
- Storage Services Connector
- StorageGRID (formerly StorageGRID Webscale)
- StorageGRID9 (9.x and prior)
- System Manager 9.x
Software Versions and Fixes
NetApp's currently available patches are listed below.
Workarounds
If a product requires JRE but does not include it, please update JRE to a fixed version that aligns with the product requirements.
- Updating the Java Runtime Environment (JRE) used by SANtricity Storage Manager 11.10 or later https://kb.netapp.com/support/index?page=content&id=1014947
Obtaining Software Fixes
Software fixes will be made available through the NetApp Support website in the Software Download section.
https://mysupport.netapp.com/site/downloads/
Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.
Contact Information
Check http://mysupport.netapp.com for further
updates.
For questions, contact NetApp at:
Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)
Status of This Notice
Final.
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20141023-0001
Revision History
Revision # | Date | Comments |
---|---|---|
1.0 | 20141023 | Initial Public Release |
2.0 | 20141024 | Updated Products Under Investigation; added product to Affected Products |
3.0 | 20141106 | Added workaround; updated Affected Products |
4.0 | 20141110 | Updated Affected Products |
5.0 | 20141111 | Updated Products Not Affected |
6.0 | 20141121 | Updated Products Not Affected and Affected Products |
7.0 | 20141126 | Updated Software Versions and Fixes |
8.0 | 20141201 | Updated Software Versions and Fixes |
9.0 | 20141211 | Updated Affected Products |
10.0 | 20150210 | Updated Products Not Affected |
11.0 | 20150309 | Updated Software Versions and Fixes |
12.0 | 20150325 | Updated Affected Products |
13.0 | 20150326 | Updated Software Versions and Fixes |
14.0 | 20150327 | Updated Affected Products |
15.0 | 20150514 | Updated Software Versions and Fixes |
16.0 | 20150916 | 7-Mode Transition Tool, E-Series/EF-Series SANtricity Storage Manager, OnCommand Unified Manager Host Package & OnCommand Report added to Software Versions and Fixes |
17.0 | 20151202 | SnapManager for Oracle (SMO) and SnapManager for SAP (SMSAP) added to Software Versions and Fixes |
18.0 | 20160126 | MetroCluster Plug-in for vSphere removed due to EOA |
19.0 | 20160510 | OnCommand Balance added to Software Versions and Fixes |
20.0 | 20170322 | OnCommand Unified Manager Core Package 5.x added to Software Versions and Fixes, Final status |
This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2024 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.