Skip to navigation

Security Advisory Important: Red Hat JBoss Enterprise Application Platform 6.1.0 security update

Advisory: RHSA-2013:1151-1
Type: Security Advisory
Severity: Important
Issued on: 2013-08-12
Last updated on: 2013-08-12
Affected Products: JBoss Enterprise Application Platform 6 EL5
JBoss Enterprise Application Platform 6 EL6
CVEs (cve.mitre.org): CVE-2013-4128
CVE-2013-4213

Details

Updated Red Hat JBoss Enterprise Application Platform 6.1.0 packages that
fix two security issues are now available for Red Hat Enterprise Linux 5
and 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.

A flaw was discovered in the way authenticated connections were cached on
the server by remote-naming. After a user has successfully logged in, a
remote attacker could use a remoting client to log in as that user without
knowing their password, allowing them to access data and perform actions
with the privileges of that user. (CVE-2013-4128)

A flaw was discovered in the way connections for remote EJB invocations via
the EJB client API were cached on the server. After a user has successfully
logged in, a remote attacker could use an EJB client to log in as that user
without knowing their password, allowing them to access data and perform
actions with the privileges of that user. (CVE-2013-4213)

These issues were discovered by Wolf-Dieter Fink of the Red Hat GSS Team.

Warning: Before applying this update, back up your existing Red Hat JBoss
Enterprise Application Platform installation and deployed applications.

All users of Red Hat JBoss Enterprise Application Platform 6.1.0 on Red Hat
Enterprise Linux 5 and 6 are advised to upgrade to these updated packages.
The JBoss server process must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

JBoss Enterprise Application Platform 6 EL5

SRPMS:
jboss-as-client-all-7.2.0-9.Final_redhat_9.ep6.el5.src.rpm
File outdated by:  RHSA-2014:0343
    MD5: 86d162cb7e703eef6b2936b8ea203f7a
SHA-256: b63e95d8b0b3d8ce0fcbee1a6d8039d9e1d43b5140cb665ca435c5f89071ce6e
jboss-ejb-client-1.0.21-2.Final_redhat_2.ep6.el5.src.rpm
File outdated by:  RHSA-2014:0343
    MD5: fc799eacee372de80fe56ee7af9b9bb5
SHA-256: 79f987142d27fd6e04768548ee919aa26e32c7832ba1108d99338ccdfa2df3a4
jboss-remote-naming-1.0.6-3.Final_redhat_3.ep6.el5.src.rpm
File outdated by:  RHSA-2014:0343
    MD5: 5708270e44430fb61504931853c9fbb7
SHA-256: 8cebcea81ea0751baa54c3aef70f4e28c4da04d328084592e8ace91c3bd681d8
 
IA-32:
jboss-as-client-all-7.2.0-9.Final_redhat_9.ep6.el5.noarch.rpm
File outdated by:  RHSA-2014:0343
    MD5: 59404edb2667474c94d1ef56baad8d6e
SHA-256: b76fe106969c4f26560e62b4a1d1805f96b9f0686f482aed200ef2cc92a757a0
jboss-ejb-client-1.0.21-2.Final_redhat_2.ep6.el5.noarch.rpm
File outdated by:  RHSA-2014:0343
    MD5: dc87b06bb67ded59681090b8d0fba7c5
SHA-256: 284d3f8bc1d4cc1153ad3fd14715ac95a304d5207aad8bc0c0617ec6582611aa
jboss-remote-naming-1.0.6-3.Final_redhat_3.ep6.el5.noarch.rpm
File outdated by:  RHSA-2014:0343
    MD5: d0675d13b2c05ef4d61418a95cbe7f15
SHA-256: c57b80775b6f242295c000bedb9db743bcee61c406d93a30f423a9d8375f2e94
 
x86_64:
jboss-as-client-all-7.2.0-9.Final_redhat_9.ep6.el5.noarch.rpm
File outdated by:  RHSA-2014:0343
    MD5: 59404edb2667474c94d1ef56baad8d6e
SHA-256: b76fe106969c4f26560e62b4a1d1805f96b9f0686f482aed200ef2cc92a757a0
jboss-ejb-client-1.0.21-2.Final_redhat_2.ep6.el5.noarch.rpm
File outdated by:  RHSA-2014:0343
    MD5: dc87b06bb67ded59681090b8d0fba7c5
SHA-256: 284d3f8bc1d4cc1153ad3fd14715ac95a304d5207aad8bc0c0617ec6582611aa
jboss-remote-naming-1.0.6-3.Final_redhat_3.ep6.el5.noarch.rpm
File outdated by:  RHSA-2014:0343
    MD5: d0675d13b2c05ef4d61418a95cbe7f15
SHA-256: c57b80775b6f242295c000bedb9db743bcee61c406d93a30f423a9d8375f2e94
 
JBoss Enterprise Application Platform 6 EL6

SRPMS:
jboss-as-client-all-7.2.0-9.Final_redhat_9.ep6.el6.src.rpm
File outdated by:  RHSA-2014:0344
    MD5: 1bb55d04e9b6e65c17ea620858298192
SHA-256: 2c2528190c560e2b675040ff167a6142c0ccb0e4c16457a48af929a0161e1203
jboss-ejb-client-1.0.21-2.Final_redhat_2.ep6.el6.src.rpm
File outdated by:  RHSA-2014:0344
    MD5: d7a3e69318d19701a94418572bad8710
SHA-256: a32533dfa81433895cb5ba0b43a9b82d7df6648353b20948d8d520d53e710346
jboss-remote-naming-1.0.6-3.Final_redhat_3.ep6.el6.src.rpm
File outdated by:  RHSA-2014:0344
    MD5: e18a5f170e2df82e89e1e31b418f85af
SHA-256: e4722aeea314a301fbb5e6bfdf296b3d7997252d8016c3b1540e0d31151c801c
 
IA-32:
jboss-as-client-all-7.2.0-9.Final_redhat_9.ep6.el6.noarch.rpm
File outdated by:  RHSA-2014:0344
    MD5: 674b90781c5482e7581627fc921b113d
SHA-256: 8529f487f21d7e3e2fe94b862fb9ff3d38e3084d48573e7d43e9c60329359cd7
jboss-ejb-client-1.0.21-2.Final_redhat_2.ep6.el6.noarch.rpm
File outdated by:  RHSA-2014:0344
    MD5: 904d13d7034d55292731462049507800
SHA-256: 53dba4ececddb24de7f85eb4ee2cafb6912a66d9e63273d0aba0fc322da0e238
jboss-remote-naming-1.0.6-3.Final_redhat_3.ep6.el6.noarch.rpm
File outdated by:  RHSA-2014:0344
    MD5: ddf90e915f8953e7baaf4142ecf4f437
SHA-256: e46f0d0234a6e6df48a1a27b5e65ab31c34136f99c0a3d6502a07acceb24cdb2
 
x86_64:
jboss-as-client-all-7.2.0-9.Final_redhat_9.ep6.el6.noarch.rpm
File outdated by:  RHSA-2014:0344
    MD5: 674b90781c5482e7581627fc921b113d
SHA-256: 8529f487f21d7e3e2fe94b862fb9ff3d38e3084d48573e7d43e9c60329359cd7
jboss-ejb-client-1.0.21-2.Final_redhat_2.ep6.el6.noarch.rpm
File outdated by:  RHSA-2014:0344
    MD5: 904d13d7034d55292731462049507800
SHA-256: 53dba4ececddb24de7f85eb4ee2cafb6912a66d9e63273d0aba0fc322da0e238
jboss-remote-naming-1.0.6-3.Final_redhat_3.ep6.el6.noarch.rpm
File outdated by:  RHSA-2014:0344
    MD5: ddf90e915f8953e7baaf4142ecf4f437
SHA-256: e46f0d0234a6e6df48a1a27b5e65ab31c34136f99c0a3d6502a07acceb24cdb2
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

984795 - CVE-2013-4128 JBoss remote-naming: Session fixation due improper connection caching
985359 - CVE-2013-4213 JBoss ejb-client: Session fixation due improper connection caching


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/