Skip to navigation

Security Advisory Moderate: JBoss Web Framework Kit 1.0.0 removal

Advisory: RHSA-2011:0175-1
Type: Security Advisory
Severity: Moderate
Issued on: 2011-01-25
Last updated on: 2011-01-25
Affected Products:
CVEs (cve.mitre.org): CVE-2010-1622

Details

JBoss Web Framework Kit 1.0.0 contains a security flaw and should no
longer be used. This update removes the JBoss Web Framework Kit 1.0.0
packages.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

The JBoss Web Framework Kit combines popular open source web frameworks
into a single solution for Java applications.

The spring2 packages shipped as part of JBoss Web Framework Kit 1.0.0 are
vulnerable to a security flaw that could allow a remote attacker to
execute arbitrary code via a specially-crafted HTTP request.
(CVE-2010-1622)

This update removes the JBoss Web Framework Kit 1.0.0 packages. JBoss Web
Framework Kit 1.0.0 RPMs and updates will no longer be available from the
Red Hat Network.

Registered users wishing to continue to use the JBoss Web Framework Kit are
advised to download the latest version, 1.1.0, from the Red Hat Customer
Portal:

https://access.redhat.com/jbossnetwork/

Future updates for JBoss Web Framework Kit will be made available only
through the Red Hat Customer Portal. Note that JBoss Web Framework Kit
1.1.0 from the Customer Portal does not include the Spring framework, and
is therefore not affected by the CVE-2010-1622 issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

606706 - CVE-2010-1622 SpringSource Spring Framework (x < 2.5.6.SEC02, 2.5.7.SR01, 3.0.3): Arbitrary Java code execution via an HTTP request containing a specially-crafted .jar file


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/