SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Server/CGI)  >   JBoss Vendors:   Red Hat
JBoss Enterprise Application Platform Remoting Bug Lets Remote Users Deny Service
SecurityTracker Alert ID:  1024840
SecurityTracker URL:  http://securitytracker.com/id/1024840
CVE Reference:   CVE-2010-4265   (Links to External Site)
Date:  Dec 9 2010
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.3.0
Description:   A vulnerability was reported in JBoss Enterprise Application Platform. A remote user can cause denial of service conditions.

A remote user can send specially-crafted data to cause the target JBoss Remoting listeners to become unresponsive. Ole Husgaard of eXerp.com reported this vulnerability.

[Editor's note: On December 8, 2010, Red Hat reported that the JBoss EAP 430_CP09 security updates for Red Hat Enterprise Linux 4, Red Hat Enterprise Linux 5, and the Customer Support Portal did not provide a fix for CVE-2010-3862. The missing fix has been assigned CVE-2010-4265.]

Impact:   A remote user can cause denial of service conditions.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

https://rhn.redhat.com/errata/RHSA-2010-0964.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2010-0964.html (Links to External Site)
Cause:   State error
Underlying OS:   Linux (Red Hat Enterprise)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Dec 9 2010 (Red Hat Issues Fix) JBoss Enterprise Application Platform Remoting Bug Lets Remote Users Deny Service   (bugzilla@redhat.com)
Red Hat has issued a fix available via the Red Hat Customer Portal.



 Source Message Contents

Date:  Wed, 8 Dec 2010 13:10:23 -0700
Subject:  [RHSA-2010:0964-01] Low: jboss-remoting security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: jboss-remoting security update
Advisory ID:       RHSA-2010:0964-01
Product:           JBoss Enterprise Application Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2010-0964.html
Issue date:        2010-12-08
CVE Names:         CVE-2010-4265 
=====================================================================

1. Summary:

An updated jboss-remoting package that fixes one security issue is now
available for JBoss Enterprise Application Platform 4.3 for Red Hat
Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS - noarch
JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES - noarch
JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server - noarch

3. Description:

JBoss Remoting is a framework for building distributed applications in
Java.

The JBoss Enterprise Application Platform 4.3.0.CP09 updates RHSA-2010:0937
and RHSA-2010:0938 did not, unlike the errata texts stated, provide a fix
for CVE-2010-3862. A remote attacker could use specially-crafted input to
cause the JBoss Remoting listeners to become unresponsive, resulting in a
denial of service condition for services communicating via JBoss Remoting
sockets. (CVE-2010-4265)

Red Hat would like to thank Ole Husgaard of eXerp.com for reporting this
issue.

Warning: Before applying this update, backup your existing JBoss Enterprise
Application Platform installation (including all applications and
configuration files).

Users of JBoss Enterprise Application Platform 4.3 on Red Hat Enterprise
Linux 4 and 5 should upgrade to this updated package, which contains a
backported patch to correct this issue. The JBoss server process must be
restarted for this update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

660623 - CVE-2010-4265 jboss-remoting: missing fix for CVE-2010-3862

6. Package List:

JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS:

Source:
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-remoting-2.2.3-4.SP3.ep1.1.el4.src.rpm

noarch:
jboss-remoting-2.2.3-4.SP3.ep1.1.el4.noarch.rpm

JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES:

Source:
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-remoting-2.2.3-4.SP3.ep1.1.el4.src.rpm

noarch:
jboss-remoting-2.2.3-4.SP3.ep1.1.el4.noarch.rpm

JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-remoting-2.2.3-4.SP3.ep1.1.el5.src.rpm

noarch:
jboss-remoting-2.2.3-4.SP3.ep1.1.el5.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2010-4265.html
https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFM/+YEXlSAg2UNWIIRAqcdAJ9Nm4ktzkDp+EzXZiR6m15FWtDE9ACfZkUt
1Clx+txwJRhaSadVJ78R/1c=
=VtFr
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC