Advisory Published

RHSA-2013:1006: Important: Red Hat JBoss BRMS 5.3.1 update

First published: Mon Jul 01 2013(Updated: )

Red Hat JBoss BRMS is a business rules management system for the<br>management, storage, creation, modification, and deployment of JBoss Rules.<br>This roll up patch serves as a cumulative upgrade for Red Hat JBoss BRMS<br>5.3.1. It includes various bug fixes. The following security<br>issues are also fixed with this release:<br>XML encryption backwards compatibility attacks were found against various<br>frameworks, including Apache CXF. An attacker could force a server to use<br>insecure, legacy cryptosystems, even when secure cryptosystems were enabled<br>on endpoints. By forcing the use of legacy cryptosystems, flaws such as<br>CVE-2011-1096 and CVE-2011-2487 would be exposed, allowing plain text to be<br>recovered from cryptograms and symmetric keys. This issue affected both the<br>JBoss Web Services CXF (jbossws-cxf) and JBoss Web Services Native<br>(jbossws-native) stacks. (CVE-2012-5575)<br>If you are using jbossws-cxf, then automatic checks to prevent this flaw<br>are only run when WS-SecurityPolicy is used to enforce security<br>requirements. It is best practice to use WS-SecurityPolicy to enforce<br>security requirements.<br>If you are using jbossws-native, the fix for this flaw is implemented by<br>two new configuration parameters in the 'encryption' element. This element<br>can be a child of 'requires' in both client and server wsse configuration<br>descriptors (set on a per-application basis via the application's<br>jboss-wsse-server.xml and jboss-wsse-client.xml files). The new attributes<br>are 'algorithms' and 'keyWrapAlgorithms'. These attributes should contain a<br>blank space or comma separated list of algorithm IDs that are allowed for<br>the encrypted incoming message, both for encryption and private key<br>wrapping. For backwards compatibility, no algorithm checks are performed by<br>default for empty lists or missing attributes.<br>For example (do not include the line break in your configuration):<br>encryption algorithms="aes-192-gcm aes-256-gcm"<br>keyWrapAlgorithms="rsa_oaep"<br>Specifies that incoming messages are required to be encrypted, and that the<br>only permitted encryption algorithms are AES-192 and 256 in GCM mode, and<br>RSA-OAEP only for key wrapping.<br>Before performing any decryption, the jbossws-native stack will verify that<br>each algorithm specified in the incoming messages is included in the<br>allowed algorithms lists from these new encryption element attributes. The<br>algorithm values to be used for 'algorithms' and 'keyWrapAlgorithms' are<br>the same as for 'algorithm' and 'keyWrapAlgorithm' in the 'encrypt'<br>element.<br>The Jakarta Commons HttpClient component did not verify that the server<br>hostname matched the domain name in the subject's Common Name (CN) or<br>subjectAltName field in X.509 certificates. This could allow a<br>man-in-the-middle attacker to spoof an SSL server if they had a certificate<br>that was valid for any domain name. (CVE-2012-5783)<br>Multiple weaknesses were found in the JBoss Web DIGEST authentication<br>implementation, effectively reducing the security normally provided by<br>DIGEST authentication. A remote attacker could use these flaws to perform<br>replay attacks in some circumstances. (CVE-2012-5885, CVE-2012-5886,<br>CVE-2012-5887)<br>Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj<br>Somorovsky of Ruhr-University Bochum for reporting CVE-2012-5575.<br>Warning: Before applying the update, back up your existing Red Hat JBoss<br>BRMS installation (including its databases, applications, configuration<br>files, and so on).<br>All users of Red Hat JBoss BRMS 5.3.1 as provided from the Red Hat Customer<br>Portal are advised to apply this roll up patch.<br>

Affected SoftwareAffected VersionHow to fix

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203