- Issued:
- 2009-12-09
- Updated:
- 2009-12-09
RHSA-2009:1649 - Security Advisory
Synopsis
Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix
multiple security issues, several bugs, and add enhancements are now
available for Red Hat Enterprise Linux 5 as JBEAP 4.3.0.CP07.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Description
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 5 serves as a
replacement to JBEAP 4.3.0.CP06.
These updated packages include bug fixes and enhancements which are
detailed in the Release Notes, available shortly from:
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
The following security issues are also fixed with this release:
A missing check for the recommended minimum length of the truncated form of
HMAC-based XML signatures was found in xml-security. An attacker could use
this flaw to create a specially-crafted XML file that forges an XML
signature, allowing the attacker to bypass authentication that is based on
the XML Signature specification. (CVE-2009-0217)
Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss
Application Server Web Console. An attacker could use these flaws to
present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-2405)
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
An information leak flaw was found in the twiddle command line client. The
JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554)
An XSS flaw was found in the JMX Console. An attacker could use this flaw
to present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-1380)
Warning: Before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade
to these updated packages.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- JBoss Enterprise Application Platform 4.3.0 x86_64
- JBoss Enterprise Application Platform 4.3.0 i386
Fixes
- BZ - 510023 - CVE-2009-2405 JBoss Application Server Web Console XSS
- BZ - 511224 - CVE-2009-1380 jbossas JMX-Console cross-site-scripting in filter parameter
- BZ - 511915 - CVE-2009-0217 xmlsec1, mono, xml-security-c, xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass
- BZ - 512921 - CVE-2009-2625 OpenJDK: XML parsing Denial-Of-Service (6845701)
- BZ - 532113 - Tracker bug for the EAP 4.3.0.cp07 release.
- BZ - 539495 - CVE-2009-3554 JBoss EAP Twiddle logs the JMX password
JBoss Enterprise Application Platform 4.3.0
SRPM | |
---|---|
glassfish-jaxb-2.1.4-1.12.patch03.1.ep1.el5.src.rpm | SHA-256: 1c7db06c35e012b6b35127f0803b3779d3ebb6298118b54cd4c847b3aaa5896a |
glassfish-jsf-1.2_13-2.1.ep1.el5.src.rpm | SHA-256: 5e41f5b748c639dcc626c846e6a9131fb356396f5d459099f98e3affcfbbd74d |
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src.rpm | SHA-256: 394c70a42a44b1254c2593877ffc4e80afe515c2bccbda4601c805c71848a0b6 |
hibernate3-annotations-3.3.1-1.11GA_CP02.ep1.el5.src.rpm | SHA-256: b674dec07fb41dc75933ba8a6bacda4619cf1aa490b3b10bf2b2bec31e611b5e |
hibernate3-entitymanager-3.3.2-2.5.1.ep1.el5.src.rpm | SHA-256: c886eccb6eccd8378c716a386d5487e580d1bc16e3b49ee2a2d7d4e56d51d7d8 |
jacorb-2.3.0-1jpp.ep1.9.1.el5.src.rpm | SHA-256: 0f4a773b1bf9243b3ae4c51ffecf55266c7d253b91d0dae9ff5ded80b6050df8 |
jboss-aop-1.5.5-3.CP04.2.ep1.el5.src.rpm | SHA-256: 50069b33dc79e596bcdfdec87b37a8c116c92e6b5c165dc57b3e11016876d2a1 |
jboss-common-1.2.1-0jpp.ep1.3.el5.1.src.rpm | SHA-256: 022c2e633c96a826e7c8b827f5a01f3a247db31d18c69ef9efaf4a598c1a484e |
jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el5.src.rpm | SHA-256: 9a84b7091d65a482400b99428060378ca7ad4bc6a09e3971cd5ea4f3f42a3587 |
jboss-remoting-2.2.3-3.SP1.ep1.el5.src.rpm | SHA-256: 56617c9c679d4ff3df4aebf8d77a9c2c5701991eabe3f7fc8e32bbb03c6fb0a9 |
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src.rpm | SHA-256: 9268a8343ea8bf0642f8ae649b8deb8e6a008f1fce3426359b332fc7e75f88ee |
jboss-seam2-2.0.2.FP-1.ep1.18.el5.src.rpm | SHA-256: 7f089a18e15b9df80b8953e7153898573876338d9f1ffcb606b9c0b65ce27aa8 |
jbossas-4.3.0-6.GA_CP07.4.2.ep1.el5.src.rpm | SHA-256: 096dc034b93b56c2bf4b2e4946b2a1b0d51674f818346c65b57459753ba2e488 |
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src.rpm | SHA-256: f95dd9436fba798e04d8da6bc2ecd0ae2402ea2e6252a98ac1c1207e97ee2bc8 |
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el5.src.rpm | SHA-256: 0f520d484dd2f5d0ec223604cd81983487a61dcd9ace85277d33cb4d84ee4155 |
jbossws-2.0.1-4.SP2_CP07.2.1.ep1.el5.src.rpm | SHA-256: 128e8574ca16252df8f1a46ac465828e9442c80e2d861b38df31ed7e89d0383f |
jbossws-common-1.0.0-2.GA_CP05.1.ep1.el5.src.rpm | SHA-256: a19bc02857b1839015ca71afb72adb5882d67788ec4e7f7cee2b9ac2d88e1292 |
jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el5.src.rpm | SHA-256: 5197aeea4c9f9787b5f52ff8a156e8b8602f23ee8c1263904aacaacc4857aa60 |
jcommon-1.0.16-1.1.ep1.el5.src.rpm | SHA-256: f8982967a252548ff995d2a8c21b168f0d380e451b4e3d9aae77bc189985db0b |
jfreechart-1.0.13-2.3.1.ep1.el5.src.rpm | SHA-256: 198ec296de74400019cfb9c805b578c770116c93c6ad444406f3e2836f298092 |
jgroups-2.4.7-1.ep1.el5.src.rpm | SHA-256: a81379fc87163ec636570750554aeb044553fc48565cf675225c9a61ec91477b |
quartz-1.5.2-1jpp.patch01.ep1.4.1.el5.src.rpm | SHA-256: 088f4ac456f4931ffb71f7c9b72b18f566479c5f67b3219aa30d4bfbf8e25b5a |
rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el5.src.rpm | SHA-256: 991d5bbf695c841c265ad3cb28eb037670dba9d15306f973c4adf7ecc2621149 |
xml-security-1.3.0-1.3.patch01.ep1.2.1.el5.src.rpm | SHA-256: 3146b1c6786e346bb5fcda7b4b985cd2118ccbf185c7ad4d034146d81a4821d1 |
x86_64 | |
glassfish-jaxb-2.1.4-1.12.patch03.1.ep1.el5.noarch.rpm | SHA-256: 55a42d6ad8ca582e759838166adbb96381d0190a626d43069d74ab9fd4664e4f |
glassfish-jaxb-javadoc-2.1.4-1.12.patch03.1.ep1.el5.noarch.rpm | SHA-256: 4559f6bfd9e54e1edb26763fcc0dcbd7eb0d4c555aa480b72a60644fca0a3a9e |
glassfish-jsf-1.2_13-2.1.ep1.el5.noarch.rpm | SHA-256: 1d8b0d718ba38b69137ca92075fd85a5bea8179b9feb1467bbd83f03c508f356 |
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch.rpm | SHA-256: e3ab83c13ae93ee02df49fbf41af439c6be7778c4138cc21d88b9b519081e230 |
hibernate3-annotations-3.3.1-1.11GA_CP02.ep1.el5.noarch.rpm | SHA-256: 56461d3185f487e16afc699f1f4d69424f44ccd47851273570c07abcccdbabcd |
hibernate3-annotations-javadoc-3.3.1-1.11GA_CP02.ep1.el5.noarch.rpm | SHA-256: 1828b33020f3b09ca4ebee5c0b3c08dbefc7faf05ef85c926c0119d6f529346e |
hibernate3-entitymanager-3.3.2-2.5.1.ep1.el5.noarch.rpm | SHA-256: 93fe4b55971788379794def6c2eee60e114aab996f9c9d90b0037dde2ba8dccd |
hibernate3-entitymanager-javadoc-3.3.2-2.5.1.ep1.el5.noarch.rpm | SHA-256: fecdf9f4af6f1d4667ba739d71f6926c3494906c9b83c2adc4f287836e3e3f39 |
hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch.rpm | SHA-256: 2b4c7fdac233830d5c812474d58a9831f43b3bde585d34d8c5d65e57d0e4531a |
jacorb-2.3.0-1jpp.ep1.9.1.el5.noarch.rpm | SHA-256: 9d17dd3f01b72eebca3ea9f1ed005d5ceb214c18658db939e1f1bbc6286b16f6 |
jboss-aop-1.5.5-3.CP04.2.ep1.el5.noarch.rpm | SHA-256: 5f6b609de1372f817a2f80b3b77bd4ec236439b3cbd87324a2c3a6533fb92f58 |
jboss-common-1.2.1-0jpp.ep1.3.el5.1.noarch.rpm | SHA-256: 27ace59cd44af2fe7e95c176a99005ecefcb155437cd4f2b6c5350ad5616e22d |
jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el5.noarch.rpm | SHA-256: 26d793eb2794d45b7abb7afcefb9de86bb4417b9a3023999c6d1d45aefd4e371 |
jboss-remoting-2.2.3-3.SP1.ep1.el5.noarch.rpm | SHA-256: 0da96b4ebe608ebdf660f6ed8a7627c46bd0d78422b7e7553be512399588c045 |
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch.rpm | SHA-256: 8e3836364211eed45c478bcb3dbc7236f77697464176a33a72e390f4a90e9b80 |
jboss-seam-docs-1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch.rpm | SHA-256: 0d46e97bc2b3adc309c4f520889f8f6304178114567525ea69d1710ece4d4f67 |
jboss-seam2-2.0.2.FP-1.ep1.18.el5.noarch.rpm | SHA-256: 88a479356bc162127874c47d84d64180005eadbd4c9a9557428f97cb4e2d375d |
jboss-seam2-docs-2.0.2.FP-1.ep1.18.el5.noarch.rpm | SHA-256: 1458041b5163276644942b9226a965f482ccd4cb6bd6868688de61c4dc5535c4 |
jbossas-4.3.0-6.GA_CP07.4.2.ep1.el5.noarch.rpm | SHA-256: dae744ede9dc015abed3f292bcc97d147555bf4d83d1734a85b3e11a2921a322 |
jbossas-4.3.0.GA_CP07-bin-4.3.0-6.GA_CP07.4.2.ep1.el5.noarch.rpm | SHA-256: 83dfdd77f469ec5f665f79ce6834f116f2ff6af25d565cd6a9d96855f1a6a15d |
jbossas-client-4.3.0-6.GA_CP07.4.2.ep1.el5.noarch.rpm | SHA-256: ada33db5aa7106062b134d58b5017ca59287588b5e20b69a983a46c4ff337a0d |
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch.rpm | SHA-256: 8d8988d4e6eb7d8c6f36f76497e319a90495e0baa12dc510eca5ae5baa28b4a8 |
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el5.noarch.rpm | SHA-256: 07807fdd7926c4b9fbca41fc33d1701cf7e004ff737ac19ea6d44b601c52e078 |
jbossws-2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch.rpm | SHA-256: ba2c901a67cab632221271f6b9ce056dec706ea941ecc9611a58271e4bdfa073 |
jbossws-common-1.0.0-2.GA_CP05.1.ep1.el5.noarch.rpm | SHA-256: c4c196e70f1a3f85f9f5ecb1ddbc0b7df80ad7c056f43eb65b9e2a040aaf8e78 |
jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el5.noarch.rpm | SHA-256: bfadd817a0b689264cb0e9e935aa936d06a410a0cc5e163f1ed8661e6b9f24d4 |
jbossws-native42-2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch.rpm | SHA-256: 910280073bcfda4ede5917d22f5bb47e176722a25cd0f40435a26d9230cfef2d |
jcommon-1.0.16-1.1.ep1.el5.noarch.rpm | SHA-256: 53ea0e61357549f75ac43b6c9306cb670fdb98ac60f2536a63f0596fccfc6d38 |
jfreechart-1.0.13-2.3.1.ep1.el5.noarch.rpm | SHA-256: 245f7dee98430df106e548b579c595cb87c049693dca7f0783626a0e4f8cac3c |
jgroups-2.4.7-1.ep1.el5.noarch.rpm | SHA-256: 0ec341ae9045352f60db6e419442e02b858637cc14e14e18bd9299efeaf5a097 |
quartz-1.5.2-1jpp.patch01.ep1.4.1.el5.noarch.rpm | SHA-256: 6b8c4d72807d4fed20c42b5eb7ab434c9d821744039037d46c299bd47d7001fc |
rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el5.noarch.rpm | SHA-256: cd758170c9a40b4a3e67d03488309234b61b3c75dd6bd07cb6e1ec57eec375a9 |
rh-eap-docs-examples-4.3.0-6.GA_CP07.ep1.3.el5.noarch.rpm | SHA-256: 9f311eb8d804c7ea9ab4ba9510ad7145399e4272370bb93865024fbd52e185c4 |
xml-security-1.3.0-1.3.patch01.ep1.2.1.el5.noarch.rpm | SHA-256: f3a504d7de4c24eb9fd1f1af2f6345e51b5e1b0f7e7918ad747dcef0ef119dff |
i386 | |
glassfish-jaxb-2.1.4-1.12.patch03.1.ep1.el5.noarch.rpm | SHA-256: 55a42d6ad8ca582e759838166adbb96381d0190a626d43069d74ab9fd4664e4f |
glassfish-jaxb-javadoc-2.1.4-1.12.patch03.1.ep1.el5.noarch.rpm | SHA-256: 4559f6bfd9e54e1edb26763fcc0dcbd7eb0d4c555aa480b72a60644fca0a3a9e |
glassfish-jsf-1.2_13-2.1.ep1.el5.noarch.rpm | SHA-256: 1d8b0d718ba38b69137ca92075fd85a5bea8179b9feb1467bbd83f03c508f356 |
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch.rpm | SHA-256: e3ab83c13ae93ee02df49fbf41af439c6be7778c4138cc21d88b9b519081e230 |
hibernate3-annotations-3.3.1-1.11GA_CP02.ep1.el5.noarch.rpm | SHA-256: 56461d3185f487e16afc699f1f4d69424f44ccd47851273570c07abcccdbabcd |
hibernate3-annotations-javadoc-3.3.1-1.11GA_CP02.ep1.el5.noarch.rpm | SHA-256: 1828b33020f3b09ca4ebee5c0b3c08dbefc7faf05ef85c926c0119d6f529346e |
hibernate3-entitymanager-3.3.2-2.5.1.ep1.el5.noarch.rpm | SHA-256: 93fe4b55971788379794def6c2eee60e114aab996f9c9d90b0037dde2ba8dccd |
hibernate3-entitymanager-javadoc-3.3.2-2.5.1.ep1.el5.noarch.rpm | SHA-256: fecdf9f4af6f1d4667ba739d71f6926c3494906c9b83c2adc4f287836e3e3f39 |
hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch.rpm | SHA-256: 2b4c7fdac233830d5c812474d58a9831f43b3bde585d34d8c5d65e57d0e4531a |
jacorb-2.3.0-1jpp.ep1.9.1.el5.noarch.rpm | SHA-256: 9d17dd3f01b72eebca3ea9f1ed005d5ceb214c18658db939e1f1bbc6286b16f6 |
jboss-aop-1.5.5-3.CP04.2.ep1.el5.noarch.rpm | SHA-256: 5f6b609de1372f817a2f80b3b77bd4ec236439b3cbd87324a2c3a6533fb92f58 |
jboss-common-1.2.1-0jpp.ep1.3.el5.1.noarch.rpm | SHA-256: 27ace59cd44af2fe7e95c176a99005ecefcb155437cd4f2b6c5350ad5616e22d |
jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el5.noarch.rpm | SHA-256: 26d793eb2794d45b7abb7afcefb9de86bb4417b9a3023999c6d1d45aefd4e371 |
jboss-remoting-2.2.3-3.SP1.ep1.el5.noarch.rpm | SHA-256: 0da96b4ebe608ebdf660f6ed8a7627c46bd0d78422b7e7553be512399588c045 |
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch.rpm | SHA-256: 8e3836364211eed45c478bcb3dbc7236f77697464176a33a72e390f4a90e9b80 |
jboss-seam-docs-1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch.rpm | SHA-256: 0d46e97bc2b3adc309c4f520889f8f6304178114567525ea69d1710ece4d4f67 |
jboss-seam2-2.0.2.FP-1.ep1.18.el5.noarch.rpm | SHA-256: 88a479356bc162127874c47d84d64180005eadbd4c9a9557428f97cb4e2d375d |
jboss-seam2-docs-2.0.2.FP-1.ep1.18.el5.noarch.rpm | SHA-256: 1458041b5163276644942b9226a965f482ccd4cb6bd6868688de61c4dc5535c4 |
jbossas-4.3.0-6.GA_CP07.4.2.ep1.el5.noarch.rpm | SHA-256: dae744ede9dc015abed3f292bcc97d147555bf4d83d1734a85b3e11a2921a322 |
jbossas-4.3.0.GA_CP07-bin-4.3.0-6.GA_CP07.4.2.ep1.el5.noarch.rpm | SHA-256: 83dfdd77f469ec5f665f79ce6834f116f2ff6af25d565cd6a9d96855f1a6a15d |
jbossas-client-4.3.0-6.GA_CP07.4.2.ep1.el5.noarch.rpm | SHA-256: ada33db5aa7106062b134d58b5017ca59287588b5e20b69a983a46c4ff337a0d |
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch.rpm | SHA-256: 8d8988d4e6eb7d8c6f36f76497e319a90495e0baa12dc510eca5ae5baa28b4a8 |
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el5.noarch.rpm | SHA-256: 07807fdd7926c4b9fbca41fc33d1701cf7e004ff737ac19ea6d44b601c52e078 |
jbossws-2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch.rpm | SHA-256: ba2c901a67cab632221271f6b9ce056dec706ea941ecc9611a58271e4bdfa073 |
jbossws-common-1.0.0-2.GA_CP05.1.ep1.el5.noarch.rpm | SHA-256: c4c196e70f1a3f85f9f5ecb1ddbc0b7df80ad7c056f43eb65b9e2a040aaf8e78 |
jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el5.noarch.rpm | SHA-256: bfadd817a0b689264cb0e9e935aa936d06a410a0cc5e163f1ed8661e6b9f24d4 |
jbossws-native42-2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch.rpm | SHA-256: 910280073bcfda4ede5917d22f5bb47e176722a25cd0f40435a26d9230cfef2d |
jcommon-1.0.16-1.1.ep1.el5.noarch.rpm | SHA-256: 53ea0e61357549f75ac43b6c9306cb670fdb98ac60f2536a63f0596fccfc6d38 |
jfreechart-1.0.13-2.3.1.ep1.el5.noarch.rpm | SHA-256: 245f7dee98430df106e548b579c595cb87c049693dca7f0783626a0e4f8cac3c |
jgroups-2.4.7-1.ep1.el5.noarch.rpm | SHA-256: 0ec341ae9045352f60db6e419442e02b858637cc14e14e18bd9299efeaf5a097 |
quartz-1.5.2-1jpp.patch01.ep1.4.1.el5.noarch.rpm | SHA-256: 6b8c4d72807d4fed20c42b5eb7ab434c9d821744039037d46c299bd47d7001fc |
rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el5.noarch.rpm | SHA-256: cd758170c9a40b4a3e67d03488309234b61b3c75dd6bd07cb6e1ec57eec375a9 |
rh-eap-docs-examples-4.3.0-6.GA_CP07.ep1.3.el5.noarch.rpm | SHA-256: 9f311eb8d804c7ea9ab4ba9510ad7145399e4272370bb93865024fbd52e185c4 |
xml-security-1.3.0-1.3.patch01.ep1.2.1.el5.noarch.rpm | SHA-256: f3a504d7de4c24eb9fd1f1af2f6345e51b5e1b0f7e7918ad747dcef0ef119dff |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.