Skip to navigation

Security Advisory Low: Red Hat Network Proxy server jabberd security update

Advisory: RHSA-2012:1539-1
Type: Security Advisory
Severity: Low
Issued on: 2012-12-04
Last updated on: 2012-12-04
Affected Products: Red Hat Network Proxy (v. 5.5 for RHEL 5)
Red Hat Network Proxy (v. 5.5 for RHEL 6)
CVEs (cve.mitre.org): CVE-2012-3525

Details

An updated jabberd package that fixes one security issue is now available
for Red Hat Network Proxy 5.5 for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

This package provides jabberd 2, an Extensible Messaging and Presence
Protocol (XMPP) server used for XML based communication.

It was discovered that the XMPP Dialback protocol implementation in
jabberd 2 did not properly validate Verify Response and Authorization
Response messages. A remote attacker able to connect to the jabberd's
server-to-server communication port could possibly use this flaw to spoof
source domains of the XMPP messages. (CVE-2012-3525)

Users of Red Hat Network Proxy 5.5 are advised to upgrade to this updated
jabberd package, which resolves this issue. For this update to take effect,
Red Hat Network Proxy must be restarted. Refer to the Solution section for
details.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Run the following command to restart the Red Hat Network Proxy server:

# rhn-proxy restart

Updated packages

Red Hat Network Proxy (v. 5.5 for RHEL 5)

SRPMS:
jabberd-2.2.8-20.el5sat.src.rpm     MD5: dffbc4aeeed15891d41b9d499202dc67
SHA-256: 441c83aeb7df4b5944c1ce48cd8acdfed1a1dc1d4a833f2f6575351c73a59076
 
s390x:
jabberd-2.2.8-20.el5sat.s390x.rpm     MD5: 3db03768cfcdbe7b671e78c49d51668f
SHA-256: 3e079e422cf68962fb114f142e8a13e4f87f209b29b183ea4382a78680d7472f
 
x86_64:
jabberd-2.2.8-20.el5sat.x86_64.rpm     MD5: 2dadb82db8986008c199e04f71801009
SHA-256: 52ab0e67f7d9e16c51e2615fde9028174b66009b4d526882be3c5ad7a16b50bc
 
Red Hat Network Proxy (v. 5.5 for RHEL 6)

SRPMS:
jabberd-2.2.8-20.el6sat.src.rpm     MD5: d9bc7b210c0a53c717bba6e46c6f8460
SHA-256: 73b02815d21472f3a1c8355b18354877105e8b708231dcf847104bd6b4684bb5
 
s390x:
jabberd-2.2.8-20.el6sat.s390x.rpm     MD5: 042062b271aaaaca801629c8098e2b03
SHA-256: b9458f6961fd522140149b0ae0d8dee6ce2acc1167a477d4a1eefc81cebe989e
 
x86_64:
jabberd-2.2.8-20.el6sat.x86_64.rpm     MD5: 1b6019ef2f11dc920dcccbdb3b5f7c3a
SHA-256: 3d0e5d36cec66e68cebd3b09ed08db3f62402d8a9f00fc90c6c5044a710444b4
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

850872 - CVE-2012-3525 jabberd: Prone to unsolicited XMPP Dialback attacks


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/