You are here

V-233: Red Hat update for JBoss Fuse

September 3, 2013 - 6:00am

Addthis

PROBLEM:

Red Hat has issued an update for JBoss Fuse

PLATFORM:

Red Hat JBoss Fuse 6.x

ABSTRACT:

This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS.

REFERENCE LINKS:

Secunia Advisory SA54683
Redhat Advisory RHSA-2013:1185-1
CVE-2013-0269
CVE-2013-1768
CVE-2013-1821
CVE-2013-2160

IMPACT ASSESSMENT:

Medium

DISCUSSION:

A flaw was found in the logging performed during deserialization of the BrokerFactory class in Apache OpenJPA. A remote attacker able to supply a serialized instance of the BrokerFactory class, which will be deserialized on a server, could use this flaw to write an executable file to the server's file system.

A flaw in JRuby's JSON gem allowed remote attacks by creating different types of malicious objects. For example, it could initiate a denial of service attack through resource consumption by using a JSON document to create arbitrary Ruby symbols, which were never garbage collected. It could also be exploited to create internal objects which could allow a SQL injection attack.

It was discovered that JRuby's REXML library did not properly restrict XML entity expansion. An attacker could use this flaw to cause a denial of service by tricking a Ruby application using REXML to read text nodes from specially-crafted XML content, which will result in REXML consuming large amounts of system memory.

IMPACT:

Security Bypass
DoS

SOLUTION:

Updated packages are available via Red Hat Network

Addthis