- Issued:
- 2014-03-13
- Updated:
- 2014-03-13
RHSA-2014:0294 - Security Advisory
Synopsis
Important: XStream security update
Type/Severity
Security Advisory: Important
Topic
An update for the XStream component that fixes one security issue is now
available from the Red Hat Customer Portal for Red Hat JBoss Data
Virtualization 6.0.0.
The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
score, which gives detailed severity rating, is available from the CVE link
in the References section.
Description
XStream is a simple library to serialize and de-serialize objects to and
from XML.
It was found that XStream could deserialize arbitrary user-supplied XML
content, representing objects of any type. A remote attacker able to pass
XML to XStream could use this flaw to perform a variety of attacks,
including remote code execution in the context of the server running the
XStream application. (CVE-2013-7285)
The main distribution of Red Hat JBoss Data Virtualization 6.0.0 does not
contain the vulnerable XStream library and is not vulnerable to
CVE-2013-7285. Only users of Red Hat JBoss Data Virtualization 6.0.0 who
installed an optional S-RAMP distribution as provided from the Red Hat
Customer Portal are advised to apply this update.
Solution
The References section of this erratum contains a download link (you must
log in to download the updates). Before applying the updates, back up your
existing installation, including all applications, configuration files,
databases and database settings, and so on.
It is recommended to halt the server by stopping the JBoss Application
Server process before installing this update, and then after installing the
update, restart the server by starting the JBoss Application Server
process.
Affected Products
- Red Hat JBoss Middleware Text-Only Advisories for MIDDLEWARE 1 x86_64
Fixes
- BZ - 1051277 - CVE-2013-7285 XStream: remote code execution due to insecure XML deserialization
CVEs
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.