Advisory Published

RHSA-2013:1185: Important: Red Hat JBoss Fuse 6.0.0 patch 2

First published: Thu Aug 29 2013(Updated: )

Red Hat JBoss Fuse 6.0.0, based on Apache ServiceMix, provides an<br>integration platform.<br>Red Hat JBoss Fuse 6.0.0 patch 2 is an update to Red Hat JBoss Fuse 6.0.0<br>and includes bug fixes. Refer to the readme file included with the patch<br>files for information about these fixes.<br>The following security issues are also resolved with this update:<br>A flaw was found in the logging performed during deserialization of the<br>BrokerFactory class in Apache OpenJPA. A remote attacker able to supply a<br>serialized instance of the BrokerFactory class, which will be deserialized<br>on a server, could use this flaw to write an executable file to the<br>server's file system. (CVE-2013-1768)<br>A flaw in JRuby's JSON gem allowed remote attacks by creating different<br>types of malicious objects. For example, it could initiate a denial of<br>service attack through resource consumption by using a JSON document to<br>create arbitrary Ruby symbols, which were never garbage collected. It could<br>also be exploited to create internal objects which could allow a SQL<br>injection attack. (CVE-2013-0269)<br>It was discovered that JRuby's REXML library did not properly restrict XML<br>entity expansion. An attacker could use this flaw to cause a denial of<br>service by tricking a Ruby application using REXML to read text nodes from<br>specially-crafted XML content, which will result in REXML consuming large<br>amounts of system memory. (CVE-2013-1821)<br>Note: Red Hat JBoss Fuse 6.0.0 ships JRuby as part of the camel-ruby<br>component, which allows users to define Camel routes in Ruby. The default<br>use of JRuby in Red Hat JBoss Fuse 6.0.0 does not appear to expose either<br>CVE-2013-0269 or CVE-2013-1821. If the version of JRuby shipped with Red<br>Hat JBoss Fuse 6.0.0 was used to build a custom application, then these<br>flaws could be exposed.<br>Multiple denial of service flaws were found in the way the Apache CXF StAX<br>parser implementation processed certain XML files. If a web service<br>utilized the StAX parser, a remote attacker could provide a<br>specially-crafted XML file that, when processed, would lead to excessive<br>CPU and memory consumption. (CVE-2013-2160)<br>Red Hat would like to thank Ruby on Rails upstream for reporting<br>CVE-2013-0269, and Andreas Falkenberg of SEC Consult Deutschland GmbH, and<br>Christian Mainka, Juraj Somorovsky and Joerg Schwenk of Ruhr-University<br>Bochum for reporting CVE-2013-2160. Upstream acknowledges Thomas Hollstegge<br>of Zweitag and Ben Murphy as the original reporters of CVE-2013-0269.<br>All users of Red Hat JBoss Fuse 6.0 as provided from the Red Hat Customer<br>Portal are advised to apply this patch.<br>

Affected SoftwareAffected VersionHow to fix

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203