Important: JBoss Enterprise SOA Platform 4.2 and 4.3 security update
|Last updated on:||2010-12-01|
A patch for JBoss Enterprise SOA Platform 4.2 and 4.3 that fixes one
security issue is now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
JBoss Enterprise SOA Platform is the next-generation ESB and business
process automation infrastructure. JBoss Enterprise SOA Platform allows IT
to leverage existing (MoM and EAI), modern (SOA and BPM-Rules), and future
(EDA and CEP) integration methodologies to dramatically improve business
process execution speed and quality.
An input sanitization flaw was found in the way JBoss Drools implemented
certain rule base serialization. If a remote attacker supplied
specially-crafted input to a JBoss Seam based application that accepts
serialized input, it could lead to arbitrary code execution with the
privileges of the JBoss server process. (CVE-2010-3708)
All users of JBoss Enterprise SOA Platform 4.2 and 4.3 as provided from the
Red Hat Customer Portal are advised to apply this patch. Refer to the
Solution section of this erratum for update instructions.
4.3 is available from the Red Hat Customer Portal. To download and apply
1) Backup your existing JBoss Enterprise SOA Platform installation
(including its databases, applications, configuration files, and so on).
2) Log into the Customer Portal: https://access.redhat.com/login
3) Navigate to
4) On the left-hand side menu, under "JBoss Enterprise Platforms" click
"SOA Platform". Then, using the "Version:" drop down menu, select the SOA
Platform version you are using, such as "4.2.0.GA_CP05" or "4.3.0.GA_CP04".
5) From either the "Security Advisories" links, click "SOA Standalone
4.3.0.GA_CP04 CVE-2010-3708 Patch" or "SOA Platform 4.3.0.GA_CP04 CVE-2010-3708
Patch" in the "Download File" column. The "Software Details"
page is displayed, where you can download the patch.
6) After downloading the patch, ensure you backed up your existing
installation as per step 1, and then follow the manual installation steps
on the "Software Details" page (where you downloaded the patch file from).
Note that it is recommended to halt the JBoss Enterprise SOA Platform
server by stopping the JBoss Application Server process before applying the
patch, and then after applying the patch, restart the JBoss Enterprise SOA
Platform server by starting the JBoss Application Server process.
Bugs fixed (see bugzilla for more information)
633859 - CVE-2010-3708 JBoss drools deserialization remote code execution
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: