- Publié :
- 2014-02-26
- Mis à jour :
- 2014-02-26
RHSA-2014:0216 - Security Advisory
Synopsis
Important: XStream security update
Type / Sévérité
Security Advisory: Important
Sujet
An update for the XStream component that fixes one security issue is
now available from the Red Hat Customer Portal for Red Hat JBoss Fuse
Service Works 6.0.0.
The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
score, which gives detailed severity rating, is available from the CVE link
in the References section.
Description
XStream is a simple library to serialize and de-serialize objects to and
from XML.
It was found that XStream could deserialize arbitrary user-supplied XML
content, representing objects of any type. A remote attacker able to pass
XML to XStream could use this flaw to perform a variety of attacks,
including remote code execution in the context of the server running the
XStream application. (CVE-2013-7285)
All users of Red Hat JBoss Fuse Service Works 6.0.0 as provided from the
Red Hat Customer Portal are advised to apply this update.
Solution
The References section of this erratum contains a download link (you must
log in to download the updates). Before applying the updates, back up your
existing installation, including all applications, configuration files,
databases and database settings, and so on.
It is recommended to halt the server by stopping the JBoss Application
Server process before installing this update, and then after installing the
update, restart the server by starting the JBoss Application
Server process.
Produits concernés
- Red Hat JBoss Middleware Text-Only Advisories for MIDDLEWARE 1 x86_64
Correctifs
- BZ - 1051277 - CVE-2013-7285 XStream: remote code execution due to insecure XML deserialization
CVE
Le contact Red Hat Security est secalert@redhat.com. Plus d'infos contact à https://access.redhat.com/security/team/contact/.