First published: Mon Jul 01 2013(Updated: )
Red Hat JBoss BRMS is a business rules management system for the<br>management, storage, creation, modification, and deployment of JBoss Rules.<br>This roll up patch serves as a cumulative upgrade for Red Hat JBoss BRMS<br>5.3.1. It includes various bug fixes. The following security<br>issues are also fixed with this release:<br>XML encryption backwards compatibility attacks were found against various<br>frameworks, including Apache CXF. An attacker could force a server to use<br>insecure, legacy cryptosystems, even when secure cryptosystems were enabled<br>on endpoints. By forcing the use of legacy cryptosystems, flaws such as<br>CVE-2011-1096 and CVE-2011-2487 would be exposed, allowing plain text to be<br>recovered from cryptograms and symmetric keys. This issue affected both the<br>JBoss Web Services CXF (jbossws-cxf) and JBoss Web Services Native<br>(jbossws-native) stacks. (CVE-2012-5575)<br>If you are using jbossws-cxf, then automatic checks to prevent this flaw<br>are only run when WS-SecurityPolicy is used to enforce security<br>requirements. It is best practice to use WS-SecurityPolicy to enforce<br>security requirements.<br>If you are using jbossws-native, the fix for this flaw is implemented by<br>two new configuration parameters in the 'encryption' element. This element<br>can be a child of 'requires' in both client and server wsse configuration<br>descriptors (set on a per-application basis via the application's<br>jboss-wsse-server.xml and jboss-wsse-client.xml files). The new attributes<br>are 'algorithms' and 'keyWrapAlgorithms'. These attributes should contain a<br>blank space or comma separated list of algorithm IDs that are allowed for<br>the encrypted incoming message, both for encryption and private key<br>wrapping. For backwards compatibility, no algorithm checks are performed by<br>default for empty lists or missing attributes.<br>For example (do not include the line break in your configuration):<br>encryption algorithms="aes-192-gcm aes-256-gcm"<br>keyWrapAlgorithms="rsa_oaep"<br>Specifies that incoming messages are required to be encrypted, and that the<br>only permitted encryption algorithms are AES-192 and 256 in GCM mode, and<br>RSA-OAEP only for key wrapping.<br>Before performing any decryption, the jbossws-native stack will verify that<br>each algorithm specified in the incoming messages is included in the<br>allowed algorithms lists from these new encryption element attributes. The<br>algorithm values to be used for 'algorithms' and 'keyWrapAlgorithms' are<br>the same as for 'algorithm' and 'keyWrapAlgorithm' in the 'encrypt'<br>element.<br>The Jakarta Commons HttpClient component did not verify that the server<br>hostname matched the domain name in the subject's Common Name (CN) or<br>subjectAltName field in X.509 certificates. This could allow a<br>man-in-the-middle attacker to spoof an SSL server if they had a certificate<br>that was valid for any domain name. (CVE-2012-5783)<br>Multiple weaknesses were found in the JBoss Web DIGEST authentication<br>implementation, effectively reducing the security normally provided by<br>DIGEST authentication. A remote attacker could use these flaws to perform<br>replay attacks in some circumstances. (CVE-2012-5885, CVE-2012-5886,<br>CVE-2012-5887)<br>Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj<br>Somorovsky of Ruhr-University Bochum for reporting CVE-2012-5575.<br>Warning: Before applying the update, back up your existing Red Hat JBoss<br>BRMS installation (including its databases, applications, configuration<br>files, and so on).<br>All users of Red Hat JBoss BRMS 5.3.1 as provided from the Red Hat Customer<br>Portal are advised to apply this roll up patch.<br>
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.