First published: Mon Mar 25 2013(Updated: )
The Jakarta Commons HttpClient component can be used to build HTTP-aware<br>client applications (such as web browsers and web service clients).<br>The Jakarta Commons HttpClient component did not verify that the server<br>hostname matched the domain name in the subject's Common Name (CN) or<br>subjectAltName field in X.509 certificates. This could allow a<br>man-in-the-middle attacker to spoof an SSL server if they had a certificate<br>that was valid for any domain name. (CVE-2012-5783)<br>Warning: Before applying this update, back up your existing JBoss<br>Enterprise Application Platform installation (including all applications<br>and configuration files).<br>All users of JBoss Enterprise Application Platform 5.2.0 on Red Hat<br>Enterprise Linux 4, 5, and 6 are advised to upgrade to this updated<br>package. The JBoss server process must be restarted for the update to take<br>effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jakarta-commons-httpclient | <3.1-2_patch_01.ep5.el6 | 3.1-2_patch_01.ep5.el6 |
redhat/jakarta-commons-httpclient | <3.1-2_patch_01.ep5.el6 | 3.1-2_patch_01.ep5.el6 |
redhat/jakarta-commons-httpclient | <3.1-2.1_patch_01.ep5.el5 | 3.1-2.1_patch_01.ep5.el5 |
redhat/jakarta-commons-httpclient | <3.1-2.1_patch_01.ep5.el5 | 3.1-2.1_patch_01.ep5.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2013:0680 is classified as moderate.
You can fix RHSA-2013:0680 by updating the jakarta-commons-httpclient package to version 3.1-2_patch_01.ep5.el6 or 3.1-2.1_patch_01.ep5.el5.
Versions of jakarta-commons-httpclient up to 3.1-2.1_patch_01.ep5.el5 are affected by RHSA-2013:0680.
RHSA-2013:0680 addresses vulnerabilities related to improper hostname verification in the Jakarta Commons HttpClient component.
Yes, RHSA-2013:0680 is applicable to both EL5 and EL6 versions of jakarta-commons-httpclient.