First published: Thu Apr 04 2013(Updated: )
PicketBox, as used in Red Hat JBoss Enterprise Application Platform before 6.1.1, allows local users to obtain the admin encryption key by reading the Vault data file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | <=6.1.0 | |
JBoss Enterprise Application Platform | =4.2.0 | |
JBoss Enterprise Application Platform | =4.3.0 | |
JBoss Enterprise Application Platform | =5.0.0 | |
JBoss Enterprise Application Platform | =5.0.1 | |
JBoss Enterprise Application Platform | =5.1.0 | |
JBoss Enterprise Application Platform | =5.1.1 | |
JBoss Enterprise Application Platform | =5.1.2 | |
JBoss Enterprise Application Platform | =5.2.0 | |
JBoss Enterprise Application Platform | =5.2.1 | |
JBoss Enterprise Application Platform | =5.2.2 | |
JBoss Enterprise Application Platform | =6.0.0 | |
JBoss Enterprise Application Platform | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1921 is considered a high severity vulnerability due to its potential to expose sensitive admin encryption keys.
To fix CVE-2013-1921, upgrade to a version of Red Hat JBoss Enterprise Application Platform that is patched and not affected by this vulnerability.
CVE-2013-1921 affects Red Hat JBoss Enterprise Application Platform versions up to 6.1.0 and certain specified earlier versions.
The impact of CVE-2013-1921 includes unauthorized access to the admin encryption key, allowing local users to potentially compromise encrypted credentials.
If you are using an affected version of Red Hat JBoss Enterprise Application Platform without the necessary updates, your system is at risk due to CVE-2013-1921.