PROBLEM:
Red Hat has issued an update for JBoss Fuse
PLATFORM:
Red Hat JBoss Fuse 6.x
ABSTRACT:
This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS.
REFERENCE LINKS:
Secunia Advisory SA54683
Redhat Advisory RHSA-2013:1185-1
CVE-2013-0269
CVE-2013-1768
CVE-2013-1821
CVE-2013-2160
IMPACT ASSESSMENT:
Medium
DISCUSSION:
A flaw was found in the logging performed during deserialization of the BrokerFactory class in Apache OpenJPA. A remote attacker able to supply a serialized instance of the BrokerFactory class, which will be deserialized on a server, could use this flaw to write an executable file to the server's file system.
A flaw in JRuby's JSON gem allowed remote attacks by creating different types of malicious objects. For example, it could initiate a denial of service attack through resource consumption by using a JSON document to create arbitrary Ruby symbols, which were never garbage collected. It could also be exploited to create internal objects which could allow a SQL injection attack.
It was discovered that JRuby's REXML library did not properly restrict XML entity expansion. An attacker could use this flaw to cause a denial of service by tricking a Ruby application using REXML to read text nodes from specially-crafted XML content, which will result in REXML consuming large amounts of system memory.
IMPACT:
Security Bypass
DoS
SOLUTION:
Updated packages are available via Red Hat Network