Show plain JSON{"affected_release": [{"advisory": "RHSA-2017:0193", "cpe": "cpe:/a:redhat:jboss_core_services:1::el6", "package": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6", "product_name": "JBoss Core Services on RHEL 6", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0193", "cpe": "cpe:/a:redhat:jboss_core_services:1::el6", "package": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6", "product_name": "JBoss Core Services on RHEL 6", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0193", "cpe": "cpe:/a:redhat:jboss_core_services:1::el6", "package": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6", "product_name": "JBoss Core Services on RHEL 6", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0193", "cpe": "cpe:/a:redhat:jboss_core_services:1::el6", "package": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6", "product_name": "JBoss Core Services on RHEL 6", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0193", "cpe": "cpe:/a:redhat:jboss_core_services:1::el6", "package": "jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6", "product_name": "JBoss Core Services on RHEL 6", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0193", "cpe": "cpe:/a:redhat:jboss_core_services:1::el6", "package": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6", "product_name": "JBoss Core Services on RHEL 6", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0193", "cpe": "cpe:/a:redhat:jboss_core_services:1::el6", "package": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6", "product_name": "JBoss Core Services on RHEL 6", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0193", "cpe": "cpe:/a:redhat:jboss_core_services:1::el6", "package": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6", "product_name": "JBoss Core Services on RHEL 6", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0193", "cpe": "cpe:/a:redhat:jboss_core_services:1::el6", "package": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6", "product_name": "JBoss Core Services on RHEL 6", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0194", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0194", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0194", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0194", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0194", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0194", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0194", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0194", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2017:0194", "cpe": "cpe:/a:redhat:jboss_core_services:1::el7", "package": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7", "product_name": "JBoss Core Services on RHEL 7", "release_date": "2017-01-25T00:00:00Z"}, {"advisory": "RHSA-2016:2957", "cpe": "cpe:/a:redhat:jboss_core_services:1", "product_name": "Text-Only JBCS", "release_date": "2016-12-15T00:00:00Z"}], "bugzilla": {"description": "mod_cluster: Protocol parsing logic error", "id": "1387605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387605"}, "csaw": false, "cvss": {"cvss_base_score": "2.9", "cvss_scoring_vector": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "status": "verified"}, "cvss3": {"cvss3_base_score": "4.3", "cvss3_scoring_vector": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "status": "verified"}, "cwe": "CWE-20", "details": ["Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process.", "An error was found in protocol parsing logic of mod_cluster load balancer Apache HTTP Server modules. An attacker could use this flaw to cause a Segmentation Fault in the serving httpd process."], "name": "CVE-2016-8612", "package_state": [{"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5", "fix_state": "Will not fix", "package_name": "mod_cluster", "product_name": "Red Hat JBoss Enterprise Application Platform 5"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6", "fix_state": "Will not fix", "package_name": "mod_cluster", "product_name": "Red Hat JBoss Enterprise Application Platform 6"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7", "fix_state": "Not affected", "package_name": "mod_cluster", "product_name": "Red Hat JBoss Enterprise Application Platform 7"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2", "fix_state": "Will not fix", "package_name": "mod_cluster", "product_name": "Red Hat JBoss Enterprise Web Server 2"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3", "fix_state": "Affected", "package_name": "mod_cluster", "product_name": "Red Hat JBoss Enterprise Web Server 3"}], "public_date": "2016-12-15T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2016-8612\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-8612"], "threat_severity": "Low"}