Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:2659 - Security Advisory
Issued:
2015-12-16
Updated:
2015-12-16

RHSA-2015:2659 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat JBoss Web Server 3.0.2 security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated Red Hat JBoss Web Server 3.0.2 packages are now available for Red
Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

Red Hat JBoss Web Server is a fully integrated and certified set of
components for hosting Java web applications. It is comprised of the
Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat
Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and
the Tomcat Native library.

It was found that Tomcat would keep connections open after processing
requests with a large enough request body. A remote attacker could
potentially use this flaw to exhaust the pool of available connections
and prevent further, legitimate connections to the Tomcat server.
(CVE-2014-0230)

A flaw was found in the way httpd handled HTTP Trailer headers when
processing requests using chunked encoding. A malicious client could
use Trailer headers to set additional HTTP headers after header
processing was performed by other modules. This could, for example,
lead to a bypass of header restrictions defined with mod_headers.
(CVE-2013-5704)

Multiple flaws were found in the way httpd parsed HTTP requests and
responses using chunked transfer encoding. A remote attacker could
use these flaws to create a specially crafted request, which httpd
would decode differently from an HTTP proxy software in front of it,
possibly leading to HTTP request smuggling attacks. (CVE-2015-3183)

  • This enhancement update adds the Red Hat JBoss Web Server 3.0.2

packages to Red Hat Enterprise Linux 6. These packages provide a
number of enhancements over the previous version of Red Hat JBoss Web
Server. (JIRA#JWS-228)

Users of Red Hat JBoss Web Server are advised to upgrade to these
updated packages, which add this enhancement.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

Affected Products

  • JBoss Enterprise Web Server 3 for RHEL 6 x86_64
  • JBoss Enterprise Web Server 3 for RHEL 6 i386

Fixes

  • BZ - 1082903 - CVE-2013-5704 httpd: bypass of mod_headers rules via chunked requests
  • BZ - 1191200 - CVE-2014-0230 tomcat: non-persistent DoS attack by feeding data by aborting an upload
  • BZ - 1243887 - CVE-2015-3183 httpd: HTTP request smuggling attack against chunked request parser
  • BZ - 1263879 - JWS3.0.2 tracker for RHEL6

CVEs

  • CVE-2013-5704
  • CVE-2014-0230
  • CVE-2014-3581
  • CVE-2015-3183
  • CVE-2015-5174

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Web Server 3 for RHEL 6

SRPM
apache-commons-collections-eap6-3.2.1-18.redhat_7.1.ep6.el6.src.rpm SHA-256: d563f19c849ddabf3a23369743b22141a26caca9a9235e6ba7ac23d20c31f7fd
httpd24-2.4.6-59.ep7.el6.src.rpm SHA-256: 62fffa504d1e715a292ad12d00809709cb38b7a50b1190319839a617482c2a58
mod_bmx-0.9.5-7.GA.ep7.el6.src.rpm SHA-256: 50a35dc4d8ae0c646a6287e30a209d7adc705d43e46260a6c9ba33c60d8e0412
mod_cluster-native-1.3.1-6.Final_redhat_2.ep7.el6.src.rpm SHA-256: c8e7c9c3919aaf76ee517a549c09f5b6f83e047af5c6c07c6e5335fe0cba7492
tomcat-vault-1.0.8-4.Final_redhat_4.1.ep7.el6.src.rpm SHA-256: c37361957ebb4f85cc087cd1330fab23165c5a8220a03a8300a311c4851e6de7
tomcat7-7.0.59-42_patch_01.ep7.el6.src.rpm SHA-256: e9f0dfdd5fb3725989c0bf9faa294e720400803a85ca95c41e16ecc1977ddeb1
tomcat8-8.0.18-52_patch_01.ep7.el6.src.rpm SHA-256: 595c1d93bc09de065ae3babbb4046720ed0a36a9739b5c5a1a61da82ef950e08
x86_64
apache-commons-collections-eap6-3.2.1-18.redhat_7.1.ep6.el6.noarch.rpm SHA-256: 3e020d2ed70a716b1eb8b720f735e70d554eda893a0414ff1ea3ba3d3340452b
apache-commons-collections-tomcat-eap6-3.2.1-18.redhat_7.1.ep6.el6.noarch.rpm SHA-256: aa2084d4914e3911d81421bdd79fbcd5ef65c5e974d83d93658c1ad45fbc3f2c
httpd24-2.4.6-59.ep7.el6.x86_64.rpm SHA-256: 67d6efa1c2a7e195cae982f1f6e4c7325b23529a6b1e6814dcfc594d369c74de
httpd24-debuginfo-2.4.6-59.ep7.el6.x86_64.rpm SHA-256: 48e4d594b9c1c304a47335a8a694c0fc8f0b90feb4d1a39bf0332766405d7fda
httpd24-devel-2.4.6-59.ep7.el6.x86_64.rpm SHA-256: 6887792d57617c1b6363324acf445d804707759db59d45f5aedfa462085b29d3
httpd24-manual-2.4.6-59.ep7.el6.noarch.rpm SHA-256: 9ed194e9104f1fd4000e96b236d41f3aec8abca816501246185d49c91f3e2b35
httpd24-tools-2.4.6-59.ep7.el6.x86_64.rpm SHA-256: 5fda6b5e3aabf99c3374983172c0410e7256301beb5a4be898aaf93fd711444f
mod_bmx-0.9.5-7.GA.ep7.el6.x86_64.rpm SHA-256: 061176644efb316e0e19317e0eb62d124ac1133d44eac59e5b2b1a9d688d9e42
mod_bmx-debuginfo-0.9.5-7.GA.ep7.el6.x86_64.rpm SHA-256: d37def95b8420f0c593f630fce6689c410b486069c55dbf0eede48be6d8037e6
mod_cluster-native-1.3.1-6.Final_redhat_2.ep7.el6.x86_64.rpm SHA-256: 0ca4b720fbd46c1b2bf81f22b20b0fc824d76c48b360062c54c065580654d2f0
mod_cluster-native-debuginfo-1.3.1-6.Final_redhat_2.ep7.el6.x86_64.rpm SHA-256: db66a82e13732ac6c1dac280ac02947fa80586e556680fc155464713b3e23e03
mod_ldap24-2.4.6-59.ep7.el6.x86_64.rpm SHA-256: e6d8daf468f5e0359844ed0b6a7b26a5986494e5b942ad175862ee0abcf542c5
mod_proxy24_html-2.4.6-59.ep7.el6.x86_64.rpm SHA-256: c3fded6bc79da9439e6f805a5f3d4750ca91a90f6ef660edb994301d8db701cd
mod_session24-2.4.6-59.ep7.el6.x86_64.rpm SHA-256: cb98e56406ce97166d87f45aad42d7d3db89581e5bbf50e57ef25ec96d3577c7
mod_ssl24-2.4.6-59.ep7.el6.x86_64.rpm SHA-256: e07b05c3ceee5dea01633c126eeb847b32ac9406897fe4634ec93cfdfdb98eb0
tomcat-vault-1.0.8-4.Final_redhat_4.1.ep7.el6.noarch.rpm SHA-256: 7de502476d60091c248dd208f93659b27d166d960ea6ff02c6219a15cdda7fe3
tomcat7-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: ef15f6e29aef0b40dd2054b1a7d4b6fc4f26af8df6f512ebe64b32c8d9530805
tomcat7-admin-webapps-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: 05a01802ce86035170580e2dbf47fe821333b17b98311100b172e186c9ec36db
tomcat7-docs-webapp-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: ce9b6baa3fa38dc01f0fd0c85a2ad2066232da581f1c9ac4402ea4ff50dd07b3
tomcat7-el-2.2-api-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: f503da0f89bfab73162090661c7769b8d6941144f8ac316673fda86e173a5193
tomcat7-javadoc-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: f54db905abd4a13d9ef6f1a9f71bb3094cb279e53acb53741d5e9eeb239cf7b8
tomcat7-jsp-2.2-api-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: ca273bba68b55cbb1c5e1d5b6914d3c873eaa1e53e5bc7c641e018d67b4e1c05
tomcat7-lib-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: cd78449a0b4de02a455b064b2d8036e9c4f95aef86574e353f3bf1ef4bc4849c
tomcat7-log4j-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: edc6ba6318568458b919e9a488d4a37dc97bdeb0c459274f8858c6d950faaa96
tomcat7-servlet-3.0-api-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: 1b3d96d5c0ce820b7dd99a8c5e160b6cf7c148c661746ec2565be33476442d2e
tomcat7-webapps-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: f8d3a06146090b58959ac2fc6ba994f4b3bb21022beba575e00a2c682e2762c9
tomcat8-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 1075a6afa990c304a1899b18ac84c60c13cb02340599297e3657f2064c3f6769
tomcat8-admin-webapps-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 9f0bb80ae082bf8930f7d86915760f8897bdc45f16ee9a462dd402d2b687f995
tomcat8-docs-webapp-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 183b2cf65b5daa8296a81248059c13ea855891506637219f0b6595bf423c84dd
tomcat8-el-2.2-api-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 8b7014d3c949ed4d174c2ead8c675d36a6bfb0ff19b9d18a08ca86953b7eaf1c
tomcat8-javadoc-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: c483af0fbe409d03946e54668c5d234dd5bb21a6d80654f23b9b9244acb344ce
tomcat8-jsp-2.3-api-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: ad6fe90a0440c13725eebe762b0a8c4b3a07d9c1f7c0cbe7ed37a57c5cf168fb
tomcat8-lib-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: cb9dd821279ada4698a28a24ec322fc8098e90c315657e45854436fce6ed6946
tomcat8-log4j-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 0690c4195c0dfa0fb72b1922384cc1d9b613ba2fb7e2dadf1d0e7d2885a34985
tomcat8-servlet-3.1-api-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 81ba279b977cd530db9af157094bf827b1fe7f46719b5a3883a6d11f6d5eca19
tomcat8-webapps-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 4a4c46a60b05856c2d72563e43358fc763b2913b12ee4d413aa3cf51fa92f752
i386
apache-commons-collections-eap6-3.2.1-18.redhat_7.1.ep6.el6.noarch.rpm SHA-256: 3e020d2ed70a716b1eb8b720f735e70d554eda893a0414ff1ea3ba3d3340452b
apache-commons-collections-tomcat-eap6-3.2.1-18.redhat_7.1.ep6.el6.noarch.rpm SHA-256: aa2084d4914e3911d81421bdd79fbcd5ef65c5e974d83d93658c1ad45fbc3f2c
httpd24-2.4.6-59.ep7.el6.i686.rpm SHA-256: eb3b0fa1003b9923242273ae9dad902e46c994e02bb8b17ba7c09d3ef8950ba7
httpd24-debuginfo-2.4.6-59.ep7.el6.i686.rpm SHA-256: 6f8a8ebfb5e401f38b3318264c4d7ddbe7f01bb93e428fe2438ea6ec58f40862
httpd24-devel-2.4.6-59.ep7.el6.i686.rpm SHA-256: 5d522788e89dc095cff725ebf9da1227974ce483b357e0f9c68ac7f40b97c14d
httpd24-manual-2.4.6-59.ep7.el6.noarch.rpm SHA-256: 9ed194e9104f1fd4000e96b236d41f3aec8abca816501246185d49c91f3e2b35
httpd24-tools-2.4.6-59.ep7.el6.i686.rpm SHA-256: 4d46d20203aedaa9ea6f9bd88c4322a0aa0adba3de193071c35253b8f1bb5b00
mod_bmx-0.9.5-7.GA.ep7.el6.i686.rpm SHA-256: 18847d979f498b1ad61fbecac495056f2040485ef6799867c6d10036e088ff80
mod_bmx-debuginfo-0.9.5-7.GA.ep7.el6.i686.rpm SHA-256: bac3df5b243733065b093700edaea98db74f0a267a1ab65cf43c980e0fe42808
mod_cluster-native-1.3.1-6.Final_redhat_2.ep7.el6.i686.rpm SHA-256: 1ea79d1962c11a4b04de27c2a7f6a4290518637bdebe05b16342f85cba281ced
mod_cluster-native-debuginfo-1.3.1-6.Final_redhat_2.ep7.el6.i686.rpm SHA-256: 24a86662f7577b70b3f6498dc382774ed87491e7d8bd6a0bcb77a0fa93ea67bf
mod_ldap24-2.4.6-59.ep7.el6.i686.rpm SHA-256: c64fd759d3993b0ead8f8963c2aabd9ab126776e785d6a977479caa09e4d07c1
mod_proxy24_html-2.4.6-59.ep7.el6.i686.rpm SHA-256: bc25cadd021e22e514ad7744abd82bdb29a056f96aed5d6d18358084f069e576
mod_session24-2.4.6-59.ep7.el6.i686.rpm SHA-256: e736ee8f3d2f68af8ec8db8b71469ddabf61e9f8f7157a161953f8d9e4e05372
mod_ssl24-2.4.6-59.ep7.el6.i686.rpm SHA-256: b0f4b9e3df7b33c31d43ea894d9fdcf59f420770ba514986fd565d512711045b
tomcat-vault-1.0.8-4.Final_redhat_4.1.ep7.el6.noarch.rpm SHA-256: 7de502476d60091c248dd208f93659b27d166d960ea6ff02c6219a15cdda7fe3
tomcat7-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: ef15f6e29aef0b40dd2054b1a7d4b6fc4f26af8df6f512ebe64b32c8d9530805
tomcat7-admin-webapps-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: 05a01802ce86035170580e2dbf47fe821333b17b98311100b172e186c9ec36db
tomcat7-docs-webapp-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: ce9b6baa3fa38dc01f0fd0c85a2ad2066232da581f1c9ac4402ea4ff50dd07b3
tomcat7-el-2.2-api-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: f503da0f89bfab73162090661c7769b8d6941144f8ac316673fda86e173a5193
tomcat7-javadoc-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: f54db905abd4a13d9ef6f1a9f71bb3094cb279e53acb53741d5e9eeb239cf7b8
tomcat7-jsp-2.2-api-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: ca273bba68b55cbb1c5e1d5b6914d3c873eaa1e53e5bc7c641e018d67b4e1c05
tomcat7-lib-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: cd78449a0b4de02a455b064b2d8036e9c4f95aef86574e353f3bf1ef4bc4849c
tomcat7-log4j-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: edc6ba6318568458b919e9a488d4a37dc97bdeb0c459274f8858c6d950faaa96
tomcat7-servlet-3.0-api-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: 1b3d96d5c0ce820b7dd99a8c5e160b6cf7c148c661746ec2565be33476442d2e
tomcat7-webapps-7.0.59-42_patch_01.ep7.el6.noarch.rpm SHA-256: f8d3a06146090b58959ac2fc6ba994f4b3bb21022beba575e00a2c682e2762c9
tomcat8-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 1075a6afa990c304a1899b18ac84c60c13cb02340599297e3657f2064c3f6769
tomcat8-admin-webapps-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 9f0bb80ae082bf8930f7d86915760f8897bdc45f16ee9a462dd402d2b687f995
tomcat8-docs-webapp-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 183b2cf65b5daa8296a81248059c13ea855891506637219f0b6595bf423c84dd
tomcat8-el-2.2-api-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 8b7014d3c949ed4d174c2ead8c675d36a6bfb0ff19b9d18a08ca86953b7eaf1c
tomcat8-javadoc-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: c483af0fbe409d03946e54668c5d234dd5bb21a6d80654f23b9b9244acb344ce
tomcat8-jsp-2.3-api-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: ad6fe90a0440c13725eebe762b0a8c4b3a07d9c1f7c0cbe7ed37a57c5cf168fb
tomcat8-lib-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: cb9dd821279ada4698a28a24ec322fc8098e90c315657e45854436fce6ed6946
tomcat8-log4j-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 0690c4195c0dfa0fb72b1922384cc1d9b613ba2fb7e2dadf1d0e7d2885a34985
tomcat8-servlet-3.1-api-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 81ba279b977cd530db9af157094bf827b1fe7f46719b5a3883a6d11f6d5eca19
tomcat8-webapps-8.0.18-52_patch_01.ep7.el6.noarch.rpm SHA-256: 4a4c46a60b05856c2d72563e43358fc763b2913b12ee4d413aa3cf51fa92f752

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility