First published: Tue Dec 07 2010(Updated: )
The JBoss EAP 430_CP09 security updates for Red Hat Enterprise Linux 4, Red Hat Enterprise Linux 5 and the Customer Support Portal did not, unlike the erratum text stated, provide a fix for <a href="https://access.redhat.com/security/cve/CVE-2010-3862">CVE-2010-3862</a>, a Denial-of-Service (DoS) flaw in the jboss-remoting component. A missing patch is considered a security regression, and requires a new CVE name. This regression is assigned <a href="https://access.redhat.com/security/cve/CVE-2010-4265">CVE-2010-4265</a>. It fixes the same issue as <a href="https://access.redhat.com/security/cve/CVE-2010-3862">CVE-2010-3862</a> and is specific to JBoss EAP 430_CP09.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-660623 is associated with a Denial-of-Service (DoS) vulnerability that can significantly impact the availability of services.
To fix REDHAT-BUG-660623, ensure to update your JBoss EAP to the latest patched version that addresses CVE-2010-3862.
REDHAT-BUG-660623 affects JBoss EAP versions that have not been updated with critical security patches prior to the release of the mentioned security update.
Currently, there are no known workarounds for REDHAT-BUG-660623 besides applying the necessary updates.
If you experience a Denial-of-Service due to REDHAT-BUG-660623, it is recommended to immediately patch your system and monitor it for any unusual activity.