First published: Thu Oct 29 2020(Updated: )
A flaw was found in JBCS httpd in version 2.4.37 SP3, where it uses a back-end worker SSL certificate with the keystore file's ID is 'unknown'. The validation of the certificate whether CN and hostname are matching stopped working and allow connecting to the back-end work. The highest threat from this vulnerability is to data integrity.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr | <0:1.6.3-104.jbcs.el6 | 0:1.6.3-104.jbcs.el6 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-75.jbcs.el6 | 0:1.6.1-75.jbcs.el6 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-38.jbcs.el6 | 0:1.0.6-38.jbcs.el6 |
redhat/jbcs-httpd24-curl | <0:7.64.1-44.jbcs.el6 | 0:7.64.1-44.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-64.jbcs.el6 | 0:2.4.37-64.jbcs.el6 |
redhat/jbcs-httpd24-jansson | <0:2.11-53.jbcs.el6 | 0:2.11-53.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-34.jbcs.el6 | 0:1.39.2-34.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-32.jbcs.el6 | 1:1.1.1c-32.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-104.jbcs.el7 | 0:1.6.3-104.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-75.jbcs.el7 | 0:1.6.1-75.jbcs.el7 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-38.jbcs.el7 | 0:1.0.6-38.jbcs.el7 |
redhat/jbcs-httpd24-curl | <0:7.64.1-44.jbcs.el7 | 0:7.64.1-44.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-64.jbcs.el7 | 0:2.4.37-64.jbcs.el7 |
redhat/jbcs-httpd24-jansson | <0:2.11-53.jbcs.el7 | 0:2.11-53.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-34.jbcs.el7 | 0:1.39.2-34.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-32.jbcs.el7 | 1:1.1.1c-32.jbcs.el7 |
redhat/jbcs-httpd24-openssl-chil | <0:1.0.0-1.jbcs.el7 | 0:1.0.0-1.jbcs.el7 |
Redhat Jboss Core Services Httpd | =2.4.37-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.