Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0119 - Security Advisory
Issued:
2010-02-23
Updated:
2010-02-23

RHSA-2010:0119 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: JBoss Enterprise Web Server 1.0.1 update

Type/Severity

Security Advisory: Low

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

JBoss Enterprise Web Server 1.0.1 is now available for Red Hat Enterprise
Linux 4 and 5.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

Description

JBoss Enterprise Web Server is a fully integrated and certified set
of components for hosting Java web applications. It is comprised of the
industry's leading web server (Apache HTTP Server), the popular Apache
Tomcat servlet container, as well as the mod_jk connector and the Tomcat
Native library.

This 1.0.1 release of JBoss Enterprise Web Server serves as a replacement
to JBoss Enterprise Web Server 1.0.0 GA. These updated packages include
a number of bug fixes. For detailed component, installation, and bug fix
information, refer to the JBoss Enterprise Web Server 1.0.1 Release Notes,
available shortly from the link in the References section of this erratum.

The following security issues are also fixed with this release:

A directory traversal flaw was found in the Tomcat deployment process. An
attacker could create a specially-crafted WAR file, which once deployed
by a local, unsuspecting user, would lead to attacker-controlled content
being deployed outside of the web root, into directories accessible to the
Tomcat process. (CVE-2009-2693)

A second directory traversal flaw was found in the Tomcat deployment
process. WAR file names were not sanitized, which could allow an attacker
to create a specially-crafted WAR file that could delete files in the
Tomcat host's work directory. (CVE-2009-2902)

A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure
Sockets Layer) protocols handle session renegotiation. A man-in-the-middle
attacker could use this flaw to prefix arbitrary plain text to a client's
session (for example, an HTTPS connection to a website). This could force
the server to process an attacker's request as if authenticated using the
victim's credentials. (CVE-2009-3555)

This update provides a mitigation for this flaw in the following
components:

tomcat5 and tomcat6: A new attribute, allowUnsafeLegacyRenegotiation, is
available for the blocking IO (BIO) connector using JSSE, to enable or
disable TLS session renegotiation. The default value is "false", meaning
session renegotiation, both client- and server-initiated, is disabled by
default.

tomcat-native: Client-initiated renegotiation is now rejected by the native
connector. Server-initiated renegotiation is still allowed.

Refer to the following Knowledgebase article for additional details about
the CVE-2009-3555 flaw: http://kbase.redhat.com/faq/docs/DOC-20491

All users of JBoss Enterprise Web Server 1.0.0 on Red Hat Enterprise Linux
4 and 5 are advised to upgrade to these updated packages.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • JBoss Enterprise Web Server 1 for RHEL 5 x86_64
  • JBoss Enterprise Web Server 1 for RHEL 5 i386

Fixes

  • BZ - 533125 - CVE-2009-3555 TLS: MITM attacks via session renegotiation
  • BZ - 558872 - JBEWS 1.0.1 release tracker bug for RHEL 4
  • BZ - 558873 - JBEWS 1.0.1 release tracker bug for RHEL-5
  • BZ - 559738 - CVE-2009-2693 tomcat: unexpected file deletion and/or alteration
  • BZ - 559761 - CVE-2009-2902 tomcat: unexpected file deletion in work directory

CVEs

  • CVE-2009-3555
  • CVE-2009-2902
  • CVE-2009-2693
  • CVE-2010-2086

References

  • http://www.redhat.com/security/updates/classification/#low
  • http://kbase.redhat.com/faq/docs/DOC-20491
  • http://www.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0.1/html-single/Release_Notes/index.html
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Web Server 1 for RHEL 5

SRPM
glassfish-jsf-1.2_13-3.ep5.el5.src.rpm SHA-256: 11a9f928a2289686e00e46b5b48518ee01947cd12ef4dd5ba03dcd56906fa65f
httpd-2.2.14-1.2.1.ep5.el5.src.rpm SHA-256: 4673594cb39ceadce675ff62f0412e641baefb50c4269dfe4146aa69f5c375aa
jakarta-commons-chain-1.2-2.1.1.ep5.el5.src.rpm SHA-256: e5a5bbe157e7c754ebc9aa781742cec60416f33461f7a3cc5a8a46a1fb68873e
jakarta-commons-io-1.4-1.1.ep5.el5.src.rpm SHA-256: 65f5538b7bf0b386aac8edd206067e4a19e58b82f7c808816814940f2321c2de
jakarta-oro-2.0.8-3.1.ep5.el5.src.rpm SHA-256: bd63b81914d07168de8aad33a02720d4ee2a8a7980a6b799c38e956639ab7f15
mod_jk-1.2.28-4.1.ep5.el5.src.rpm SHA-256: 60dc985f89afa53830a0f1fd4b5e392892905da994450c95c705b382c6c88a43
struts12-1.2.9-2.ep5.el5.src.rpm SHA-256: 57d2049c71bc72c56ee03c965b65e999ea6890f8c33771033ff41121c1858cc2
tomcat-native-1.1.19-2.0.1.ep5.el5.src.rpm SHA-256: dadd28525ab7bd4b47df5fa8b8592da294cb2b979e254c617eef02f1360f17cb
tomcat5-5.5.28-7.1.ep5.el5.src.rpm SHA-256: 08c2c9143663606ae376cbc219f1eb15d73d027636d2ffaab2ec844668b427df
tomcat6-6.0.24-2.1.ep5.el5.src.rpm SHA-256: 52e7375630cd8feea461503ae01a4751437f559c385fe83ccc016d0f034b48b2
x86_64
glassfish-jsf-1.2_13-3.ep5.el5.noarch.rpm SHA-256: 0096bc0fcb0a20385abc853f6112627124dad9b2942e93c3456c389dc93ed06c
httpd-2.2.14-1.2.1.ep5.el5.x86_64.rpm SHA-256: b96f1241aebe9caea8e77180d74b8a43a2623183dc661c4f0427a99b1c36cac4
httpd-devel-2.2.14-1.2.1.ep5.el5.x86_64.rpm SHA-256: 944dc786ac7303e4a9d76ab4c8a2c7efcbc9fadb551a12170c51f6dc4f892c96
httpd-manual-2.2.14-1.2.1.ep5.el5.x86_64.rpm SHA-256: ea11e51d894f70899f7d3a2c8aa6fb87756ed78a6c8069159ad56dbcfe143d0e
jakarta-commons-chain-1.2-2.1.1.ep5.el5.noarch.rpm SHA-256: 05f9fbb0fb7a94c8187ff45a2abd9114c5c01c72c0f29bb1a28c78256097ea78
jakarta-commons-io-1.4-1.1.ep5.el5.noarch.rpm SHA-256: cd89b2e2f7663b14565490a45036166ec5dddde086270834b3880cee3c4ea88a
jakarta-oro-2.0.8-3.1.ep5.el5.noarch.rpm SHA-256: e8468790fe75fd57494ec96ed08eca9a920c414c71ce2a3f05aadfced3812cec
mod_jk-ap20-1.2.28-4.1.ep5.el5.x86_64.rpm SHA-256: f4ae5008e4656ffa768ddbec11a068354da7d146f5a2e17b5ed065f0e97284f8
mod_jk-manual-1.2.28-4.1.ep5.el5.x86_64.rpm SHA-256: f5613192094ca679fefdf408be863e74bf83ec1386075c956b32f9c71556ac51
mod_ssl-2.2.14-1.2.1.ep5.el5.x86_64.rpm SHA-256: 1f02761d55c5b3b8eaf1674a9c57b1af6ab58eddae5206a1255dd2ea599e5818
struts12-1.2.9-2.ep5.el5.noarch.rpm SHA-256: b985418019fb17719fe2fea330d7ab8ae62c846c39da5becccd55c12e81460cd
tomcat-native-1.1.19-2.0.1.ep5.el5.x86_64.rpm SHA-256: bef7699088115847ee7681aad8e075dfea7af365ee546d7ba5ebbd864129d514
tomcat5-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: aee317fc3435b1acc768b79479ef4651f8107f733f08e93b480fd53a6ee3eaf0
tomcat5-admin-webapps-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 62af5aced6038f2d79f477154b004f330d1bd8a2b88d6751b4cf3cad55f65bd7
tomcat5-common-lib-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 64a4a3fb2b891a95cd5a973c9badfb07421536272decbd37646100bde32c2888
tomcat5-jasper-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 247dee625d2b9aa47618087dbf9b36de56dd62a4a053a0ac787a5b4a89924bc3
tomcat5-jasper-eclipse-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 58beea62251a91f8360b799dbdbf59c8a25993c38bc6f35696038f90f35a815c
tomcat5-jasper-javadoc-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: fb30fdb7a02c87e0637c3ca5005067dcee842b94dee43208965dd372797ffa69
tomcat5-jsp-2.0-api-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 8cfa6dcca72b4f4a30cfc63269e308d15614f02c568868b9f9ec7eb13fdb24b3
tomcat5-jsp-2.0-api-javadoc-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 6705f120fd2b8c9b9a35369b26df0798f2bdf45bed4907ad57c55b74a665cd0b
tomcat5-parent-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 06ab0818dd434abf40f89951d8d8e354d4426bea1e31ea381b5e9e570d9c0806
tomcat5-server-lib-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 773b1b944e64db975dc06f6275a42d13c97c9b253b722c08309650111196104d
tomcat5-servlet-2.4-api-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 0e5f6142de531926487063716f5a40d53220154a50c30fd7457226b0f3aa599c
tomcat5-servlet-2.4-api-javadoc-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: cc2440a5fac4476bcf668d31dce7520b1f093ca029c7308a61a62822638149f1
tomcat5-webapps-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 1b38a2c43ea2672baa33a487dbf5aaa67e0ee6c5bd5a3d76ac9f0cc0a047c64e
tomcat6-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: 71c387cd8254276ccc8babd5e82ead81560d5b371110bf51d302a9e2d1e5bf5f
tomcat6-admin-webapps-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: fe9221e32a3e10a66e251a58e9dd2c6f2d6cbdb504ff8886db92aea3029aa751
tomcat6-docs-webapp-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: 9ecfa25912b53eaf7f582a4d3ac549fed2292da98d78f4c4dd14bc90017ef46e
tomcat6-el-1.0-api-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: c91e214aceaf283a39f45e5464e13b8b36cdbe8f771122de90df62bd8e3342ab
tomcat6-javadoc-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: a34429c9646468293af091b29efe2faf42e0f995263e23b9be5a67645fe22540
tomcat6-jsp-2.1-api-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: 5ec6e66478d0a87040fb87e46895c70d633e5962f6a3fb74c2cab8fd6b71d4db
tomcat6-lib-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: 4c6cb95f8f9c39b4286edaaf388c13ed1299db0ba1fca9fcd642c94374e9217d
tomcat6-log4j-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: 7d89b675bb332b9f89754adca3adbbf0465192e965173d2717798d2795dc4a8f
tomcat6-servlet-2.5-api-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: d43e8d755e14907d689e31e4f6a2146bdfa74349e7c2169001007b770ae4a0e6
tomcat6-webapps-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: 1787633583501686cf2c3a39f65526550fd3ccf7d80c46d65c7b6076f2c00e97
i386
glassfish-jsf-1.2_13-3.ep5.el5.noarch.rpm SHA-256: 0096bc0fcb0a20385abc853f6112627124dad9b2942e93c3456c389dc93ed06c
httpd-2.2.14-1.2.1.ep5.el5.i386.rpm SHA-256: 524f09190fa1bb0fd240c5298d778dbf4f79697c31e591f43440d11d550d9bd3
httpd-devel-2.2.14-1.2.1.ep5.el5.i386.rpm SHA-256: 338e77fe485e9661abb4f61aa8e68821f40183b17432dd57fca3f44696e344ce
httpd-manual-2.2.14-1.2.1.ep5.el5.i386.rpm SHA-256: 6327823d215bfcef24b830efddb8be7072688bfcfd6c7a983383e7ded2792f14
jakarta-commons-chain-1.2-2.1.1.ep5.el5.noarch.rpm SHA-256: 05f9fbb0fb7a94c8187ff45a2abd9114c5c01c72c0f29bb1a28c78256097ea78
jakarta-commons-io-1.4-1.1.ep5.el5.noarch.rpm SHA-256: cd89b2e2f7663b14565490a45036166ec5dddde086270834b3880cee3c4ea88a
jakarta-oro-2.0.8-3.1.ep5.el5.noarch.rpm SHA-256: e8468790fe75fd57494ec96ed08eca9a920c414c71ce2a3f05aadfced3812cec
mod_jk-ap20-1.2.28-4.1.ep5.el5.i386.rpm SHA-256: e4c623284e8c9c595cae55e34748af642b035b7c1ed186c632de4561b251b4c4
mod_jk-manual-1.2.28-4.1.ep5.el5.i386.rpm SHA-256: 5ddd9fb8a67fc0f492bc33fb7dcfd34f5b480b05b54e32a7dd36638a9e8c3b76
mod_ssl-2.2.14-1.2.1.ep5.el5.i386.rpm SHA-256: 1d46a982ce3b4d4ddf800e4f69d8c5b372d30bf4c3f17da199f3668021979b66
struts12-1.2.9-2.ep5.el5.noarch.rpm SHA-256: b985418019fb17719fe2fea330d7ab8ae62c846c39da5becccd55c12e81460cd
tomcat-native-1.1.19-2.0.1.ep5.el5.i386.rpm SHA-256: 2150cafae3202e9bd952ff146d593c6097b0f9912dbe7506a9dd755f11484748
tomcat5-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: aee317fc3435b1acc768b79479ef4651f8107f733f08e93b480fd53a6ee3eaf0
tomcat5-admin-webapps-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 62af5aced6038f2d79f477154b004f330d1bd8a2b88d6751b4cf3cad55f65bd7
tomcat5-common-lib-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 64a4a3fb2b891a95cd5a973c9badfb07421536272decbd37646100bde32c2888
tomcat5-jasper-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 247dee625d2b9aa47618087dbf9b36de56dd62a4a053a0ac787a5b4a89924bc3
tomcat5-jasper-eclipse-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 58beea62251a91f8360b799dbdbf59c8a25993c38bc6f35696038f90f35a815c
tomcat5-jasper-javadoc-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: fb30fdb7a02c87e0637c3ca5005067dcee842b94dee43208965dd372797ffa69
tomcat5-jsp-2.0-api-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 8cfa6dcca72b4f4a30cfc63269e308d15614f02c568868b9f9ec7eb13fdb24b3
tomcat5-jsp-2.0-api-javadoc-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 6705f120fd2b8c9b9a35369b26df0798f2bdf45bed4907ad57c55b74a665cd0b
tomcat5-parent-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 06ab0818dd434abf40f89951d8d8e354d4426bea1e31ea381b5e9e570d9c0806
tomcat5-server-lib-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 773b1b944e64db975dc06f6275a42d13c97c9b253b722c08309650111196104d
tomcat5-servlet-2.4-api-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 0e5f6142de531926487063716f5a40d53220154a50c30fd7457226b0f3aa599c
tomcat5-servlet-2.4-api-javadoc-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: cc2440a5fac4476bcf668d31dce7520b1f093ca029c7308a61a62822638149f1
tomcat5-webapps-5.5.28-7.1.ep5.el5.noarch.rpm SHA-256: 1b38a2c43ea2672baa33a487dbf5aaa67e0ee6c5bd5a3d76ac9f0cc0a047c64e
tomcat6-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: 71c387cd8254276ccc8babd5e82ead81560d5b371110bf51d302a9e2d1e5bf5f
tomcat6-admin-webapps-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: fe9221e32a3e10a66e251a58e9dd2c6f2d6cbdb504ff8886db92aea3029aa751
tomcat6-docs-webapp-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: 9ecfa25912b53eaf7f582a4d3ac549fed2292da98d78f4c4dd14bc90017ef46e
tomcat6-el-1.0-api-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: c91e214aceaf283a39f45e5464e13b8b36cdbe8f771122de90df62bd8e3342ab
tomcat6-javadoc-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: a34429c9646468293af091b29efe2faf42e0f995263e23b9be5a67645fe22540
tomcat6-jsp-2.1-api-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: 5ec6e66478d0a87040fb87e46895c70d633e5962f6a3fb74c2cab8fd6b71d4db
tomcat6-lib-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: 4c6cb95f8f9c39b4286edaaf388c13ed1299db0ba1fca9fcd642c94374e9217d
tomcat6-log4j-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: 7d89b675bb332b9f89754adca3adbbf0465192e965173d2717798d2795dc4a8f
tomcat6-servlet-2.5-api-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: d43e8d755e14907d689e31e4f6a2146bdfa74349e7c2169001007b770ae4a0e6
tomcat6-webapps-6.0.24-2.1.ep5.el5.noarch.rpm SHA-256: 1787633583501686cf2c3a39f65526550fd3ccf7d80c46d65c7b6076f2c00e97

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility