First published: Tue Feb 25 2014(Updated: )
Red Hat JBoss SOA Platform is the next-generation ESB and business process<br>automation infrastructure. Red Hat JBoss SOA Platform allows IT to leverage<br>existing (MoM and EAI), modern (SOA and BPM-Rules), and future (EDA and<br>CEP) integration methodologies to dramatically improve business process<br>execution speed and quality.<br>This roll up patch serves as a cumulative upgrade for Red Hat JBoss SOA<br>Platform 5.3.1. It includes various bug fixes. The following security<br>issues are also fixed with this release:<br>A flaw was found in the way Apache Santuario XML Security for Java<br>validated XML signatures. Santuario allowed a signature to specify an<br>arbitrary canonicalization algorithm, which would be applied to the<br>SignedInfo XML fragment. A remote attacker could exploit this to spoof an<br>XML signature via a specially-crafted XML signature block. (CVE-2013-2172)<br>It was discovered that the Spring OXM wrapper did not expose any property<br>for disabling entity resolution when using the JAXB unmarshaller. A remote<br>attacker could use this flaw to conduct XML External Entity (XXE) attacks<br>on web sites, and read files in the context of the user running the<br>application server. The patch for this flaw disables external entity<br>processing by default, and provides a configuration directive to re-enable<br>it. (CVE-2013-4152)<br>Warning: Before applying the update, back up your existing Red Hat JBoss<br>SOA Platform installation (including its databases, applications,<br>configuration files, and so on).<br>All users of Red Hat JBoss SOA Platform 5.3.1 as provided from the Red Hat<br>Customer Portal are advised to apply this roll up patch.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss SOA RTgov |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2014:0212 is classified as moderate.
RHSA-2014:0212 addresses vulnerabilities related to Red Hat JBoss SOA Platform affecting integration methodologies.
To fix RHSA-2014:0212, you need to apply the recommended updates provided by Red Hat for JBoss SOA Platform.
If you are using Red Hat JBoss SOA Platform, ensure you review the advisory for recommended actions to mitigate the vulnerabilities in RHSA-2014:0212.
There are no specific workarounds mentioned for RHSA-2014:0212, and applying updates is the advised action.