Skip to navigation

Security Advisory Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update

Advisory: RHSA-2009:1636-1
Type: Security Advisory
Severity: Moderate
Issued on: 2009-12-09
Last updated on: 2009-12-09
Affected Products: JBoss Enterprise Application Platform 4.3.0 EL4
CVEs (cve.mitre.org): CVE-2009-0217
CVE-2009-1380
CVE-2009-2405
CVE-2009-2625
CVE-2009-3554

Details

Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix
multiple security issues, several bugs, and add enhancements are now
available for Red Hat Enterprise Linux 4 as JBEAP 4.3.0.CP07.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.

This release of JBEAP for Red Hat Enterprise Linux 4 serves as a
replacement to JBEAP 4.3.0.CP06.

These updated packages include bug fixes and enhancements which are
detailed in the Release Notes, available shortly from:
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/

The following security issues are also fixed with this release:

A missing check for the recommended minimum length of the truncated form of
HMAC-based XML signatures was found in xml-security. An attacker could use
this flaw to create a specially-crafted XML file that forges an XML
signature, allowing the attacker to bypass authentication that is based on
the XML Signature specification. (CVE-2009-0217)

Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss
Application Server Web Console. An attacker could use these flaws to
present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-2405)

A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)

An information leak flaw was found in the twiddle command line client. The
JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554)

An XSS flaw was found in the JMX Console. An attacker could use this flaw
to present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-1380)

Warning: Before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.

All users of JBEAP 4.3 on Red Hat Enterprise Linux 4 are advised to upgrade
to these updated packages.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

JBoss Enterprise Application Platform 4.3.0 EL4

SRPMS:
glassfish-javamail-1.4.2-0jpp.ep1.5.el4.src.rpm     MD5: 145b67ee9c41b33a8de352f85f051304
glassfish-jaxb-2.1.4-1.12.patch03.ep1.el4.src.rpm
File outdated by:  RHSA-2010:0937
    MD5: 14394c788c01e1b605cc0ddb101adf3d
glassfish-jsf-1.2_13-2.1.ep1.el4.src.rpm     MD5: e605e7316b95f21b55335f39755378ba
hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.src.rpm
File outdated by:  RHBA-2011:1297
    MD5: 407d2e8bbf3faf45cdd2897e7550022b
jakarta-commons-logging-jboss-1.1-9.ep1.el4.src.rpm
File outdated by:  RHBA-2011:1297
    MD5: b86bb1f4a3afa768b04bdbf5be15081b
jboss-aop-1.5.5-3.CP04.2.ep1.el4.src.rpm
File outdated by:  RHSA-2010:0377
    MD5: 6b7aac5181672ccabebd496cda08a128
jboss-common-1.2.1-0jpp.ep1.3.el4.src.rpm
File outdated by:  RHSA-2010:0937
    MD5: 6bb967e8cebf1f57fa682f267659cedc
jboss-seam2-2.0.2.FP-1.ep1.21.el4.src.rpm
File outdated by:  RHBA-2013:1099
    MD5: 588a4aceecba2a4b7dfb4cd82bb75a52
jbossas-4.3.0-6.GA_CP07.4.ep1.el4.src.rpm
File outdated by:  RHSA-2013:0249
    MD5: 9f67e6b4c82008fdc5599b12674401fb
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src.rpm
File outdated by:  RHSA-2010:0937
    MD5: 1ba7fbe832a20b29fef955d7698b6f3e
jbossws-2.0.1-4.SP2_CP07.2.ep1.el4.src.rpm
File outdated by:  RHBA-2011:1297
    MD5: a997ecaf215959a45c723ff0045391b3
jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el4.src.rpm
File outdated by:  RHBA-2011:1297
    MD5: 4477e5e62b9a569fe0564465d2f5e5f3
jfreechart-1.0.13-2.3.1.ep1.el4.src.rpm     MD5: 213025dc57c1099ffd3fd8394629dde6
jgroups-2.4.7-1.ep1.el4.src.rpm
File outdated by:  RHBA-2011:1297
    MD5: 3fd0003c732ee8b10cb79d1a4c7d3947
quartz-1.5.2-1jpp.patch01.ep1.4.el4.src.rpm     MD5: 7c015c9879d099348c104fa6c17ba57f
rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el4.src.rpm
File outdated by:  RHBA-2011:1297
    MD5: 1af8fe436303ba4b20c5f5ae9713abed
xml-security-1.3.0-1.3.patch01.ep1.2.el4.src.rpm     MD5: 88c647eadf80413aab8e66d0e2ac4aa0
 
IA-32:
glassfish-javamail-1.4.2-0jpp.ep1.5.el4.noarch.rpm     MD5: 476e9722fb23b3a5bccfed92830d1a8c
glassfish-jaxb-2.1.4-1.12.patch03.ep1.el4.noarch.rpm
File outdated by:  RHSA-2010:0937
    MD5: da1827cdf7980f87b26004607c80c58c
glassfish-jaxb-javadoc-2.1.4-1.12.patch03.ep1.el4.noarch.rpm     MD5: bd2d56f26ac6e798945cc6dc55ffef24
glassfish-jsf-1.2_13-2.1.ep1.el4.noarch.rpm     MD5: 64d465446918246565bc84ff02dab9a7
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 74d7512d5437da8fdaa4ea46c8ccfdd8
hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 729695013417b0ad0888155bc149b110
hibernate3-annotations-javadoc-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 58b88e03b00168c54ecfc215d444f25e
hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm     MD5: 870053e20f489db1c1183a96b9dec9ba
hibernate3-entitymanager-javadoc-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm     MD5: b08dce7bdaccad269aba1d706b2599cd
hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 8a8d8c34d487cc387de6979aa87f8e64
jacorb-2.3.0-1jpp.ep1.9.el4.noarch.rpm
File outdated by:  RHSA-2010:0377
    MD5: 168dc454564a1dc633c707ad6a0070b1
jakarta-commons-logging-jboss-1.1-9.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: d3b81080bc464177ec0259cf7bcdfd6d
jboss-aop-1.5.5-3.CP04.2.ep1.el4.noarch.rpm
File outdated by:  RHSA-2010:0377
    MD5: b8db3872739144ba9ba65cd9dcf4c407
jboss-common-1.2.1-0jpp.ep1.3.el4.noarch.rpm
File outdated by:  RHSA-2010:0937
    MD5: 3c91aea68b5885d0de8e193b74cadb6b
jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 66b8844a33239b0c5775b43a6fd5ff28
jboss-remoting-2.2.3-3.SP1.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 13dcf8a1d123149c4867da4e6853a9f0
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: bb20372e06219449189ff82e2e21ae67
jboss-seam-docs-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: c9855858b560bdbe9c0a4ea8bf2d3882
jboss-seam2-2.0.2.FP-1.ep1.21.el4.noarch.rpm
File outdated by:  RHBA-2013:1099
    MD5: 0554a89cbfe5c1525aaca5d0c15b05c3
jboss-seam2-docs-2.0.2.FP-1.ep1.21.el4.noarch.rpm
File outdated by:  RHBA-2013:1099
    MD5: 8e6705bf9269cc410613160f29177ba5
jbossas-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm
File outdated by:  RHSA-2013:0249
    MD5: 112db1669fe6833368edb720f024874e
jbossas-4.3.0.GA_CP07-bin-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm     MD5: ea747ec6ca9f35d54c673e98ec966102
jbossas-client-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm
File outdated by:  RHSA-2013:0249
    MD5: 4029465de4f82c620e4c343f64227ed2
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch.rpm
File outdated by:  RHSA-2010:0937
    MD5: 59fbadd61bfc6591f40636f262c696b3
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: eaea88fc9becb4f2346d6c29b520470c
jbossws-2.0.1-4.SP2_CP07.2.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 042b27270e246c5e740e8429e159bd35
jbossws-common-1.0.0-2.GA_CP05.1.ep1.el4.noarch.rpm
File outdated by:  RHSA-2011:1306
    MD5: 91f86182b7203838c124567b106c049c
jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 654bd0ee21d773b760774f01284c4eae
jbossws-native42-2.0.1-4.SP2_CP07.2.ep1.el4.noarch.rpm     MD5: 75fbd2d4ca87de7439dec9e35f0dd2d7
jcommon-1.0.16-1.1.ep1.el4.noarch.rpm     MD5: cea191f055e1d922437f7e620575124e
jfreechart-1.0.13-2.3.1.ep1.el4.noarch.rpm     MD5: a198b5f0d06c91596e184ddfe6884b86
jgroups-2.4.7-1.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 7afdaee1b12ab04698fe6236f2dd59ca
quartz-1.5.2-1jpp.patch01.ep1.4.el4.noarch.rpm     MD5: ea7771ab531578963834fdd0d8644f79
rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 837107090e61b57ee5d02595bbf31e7d
rh-eap-docs-examples-4.3.0-6.GA_CP07.ep1.3.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 025aa7c8806aa73ff02fe3aa6938a805
xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 1b5ca809a9287df06d334029e174240c
xml-security-1.3.0-1.3.patch01.ep1.2.el4.noarch.rpm     MD5: a3d5cbad9b61caccb8d7b3bae16c2fc0
 
x86_64:
glassfish-javamail-1.4.2-0jpp.ep1.5.el4.noarch.rpm     MD5: 476e9722fb23b3a5bccfed92830d1a8c
glassfish-jaxb-2.1.4-1.12.patch03.ep1.el4.noarch.rpm
File outdated by:  RHSA-2010:0937
    MD5: da1827cdf7980f87b26004607c80c58c
glassfish-jaxb-javadoc-2.1.4-1.12.patch03.ep1.el4.noarch.rpm     MD5: bd2d56f26ac6e798945cc6dc55ffef24
glassfish-jsf-1.2_13-2.1.ep1.el4.noarch.rpm     MD5: 64d465446918246565bc84ff02dab9a7
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 74d7512d5437da8fdaa4ea46c8ccfdd8
hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 729695013417b0ad0888155bc149b110
hibernate3-annotations-javadoc-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 58b88e03b00168c54ecfc215d444f25e
hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm     MD5: 870053e20f489db1c1183a96b9dec9ba
hibernate3-entitymanager-javadoc-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm     MD5: b08dce7bdaccad269aba1d706b2599cd
hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 8a8d8c34d487cc387de6979aa87f8e64
jacorb-2.3.0-1jpp.ep1.9.el4.noarch.rpm
File outdated by:  RHSA-2010:0377
    MD5: 168dc454564a1dc633c707ad6a0070b1
jakarta-commons-logging-jboss-1.1-9.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: d3b81080bc464177ec0259cf7bcdfd6d
jboss-aop-1.5.5-3.CP04.2.ep1.el4.noarch.rpm
File outdated by:  RHSA-2010:0377
    MD5: b8db3872739144ba9ba65cd9dcf4c407
jboss-common-1.2.1-0jpp.ep1.3.el4.noarch.rpm
File outdated by:  RHSA-2010:0937
    MD5: 3c91aea68b5885d0de8e193b74cadb6b
jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 66b8844a33239b0c5775b43a6fd5ff28
jboss-remoting-2.2.3-3.SP1.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 13dcf8a1d123149c4867da4e6853a9f0
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: bb20372e06219449189ff82e2e21ae67
jboss-seam-docs-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: c9855858b560bdbe9c0a4ea8bf2d3882
jboss-seam2-2.0.2.FP-1.ep1.21.el4.noarch.rpm
File outdated by:  RHBA-2013:1099
    MD5: 0554a89cbfe5c1525aaca5d0c15b05c3
jboss-seam2-docs-2.0.2.FP-1.ep1.21.el4.noarch.rpm
File outdated by:  RHBA-2013:1099
    MD5: 8e6705bf9269cc410613160f29177ba5
jbossas-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm
File outdated by:  RHSA-2013:0249
    MD5: 112db1669fe6833368edb720f024874e
jbossas-4.3.0.GA_CP07-bin-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm     MD5: ea747ec6ca9f35d54c673e98ec966102
jbossas-client-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm
File outdated by:  RHSA-2013:0249
    MD5: 4029465de4f82c620e4c343f64227ed2
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch.rpm
File outdated by:  RHSA-2010:0937
    MD5: 59fbadd61bfc6591f40636f262c696b3
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: eaea88fc9becb4f2346d6c29b520470c
jbossws-2.0.1-4.SP2_CP07.2.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 042b27270e246c5e740e8429e159bd35
jbossws-common-1.0.0-2.GA_CP05.1.ep1.el4.noarch.rpm
File outdated by:  RHSA-2011:1306
    MD5: 91f86182b7203838c124567b106c049c
jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 654bd0ee21d773b760774f01284c4eae
jbossws-native42-2.0.1-4.SP2_CP07.2.ep1.el4.noarch.rpm     MD5: 75fbd2d4ca87de7439dec9e35f0dd2d7
jcommon-1.0.16-1.1.ep1.el4.noarch.rpm     MD5: cea191f055e1d922437f7e620575124e
jfreechart-1.0.13-2.3.1.ep1.el4.noarch.rpm     MD5: a198b5f0d06c91596e184ddfe6884b86
jgroups-2.4.7-1.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 7afdaee1b12ab04698fe6236f2dd59ca
quartz-1.5.2-1jpp.patch01.ep1.4.el4.noarch.rpm     MD5: ea7771ab531578963834fdd0d8644f79
rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 837107090e61b57ee5d02595bbf31e7d
rh-eap-docs-examples-4.3.0-6.GA_CP07.ep1.3.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 025aa7c8806aa73ff02fe3aa6938a805
xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch.rpm
File outdated by:  RHBA-2011:1297
    MD5: 1b5ca809a9287df06d334029e174240c
xml-security-1.3.0-1.3.patch01.ep1.2.el4.noarch.rpm     MD5: a3d5cbad9b61caccb8d7b3bae16c2fc0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

510023 - CVE-2009-2405 JBoss Application Server Web Console XSS
511224 - CVE-2009-1380 jbossas JMX-Console cross-site-scripting in filter parameter
511915 - CVE-2009-0217 xmlsec1, mono, xml-security-c, xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass
512921 - CVE-2009-2625 OpenJDK: XML parsing Denial-Of-Service (6845701)
532117 - Tracker bug for the EAP 4.3.0.cp07 release.
539495 - CVE-2009-3554 JBoss EAP Twiddle logs the JMX password


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/