First published: Mon Mar 24 2014(Updated: )
Red Hat JBoss Fuse 6.0.0 is an integration platform based on Apache<br>ServiceMix. Red Hat JBoss A-MQ 6.0.0, based on Apache ActiveMQ, is a<br>standards compliant messaging system that is tailored for use in mission<br>critical applications.<br>This patch is an update to Red Hat JBoss Fuse 6.0.0 and Red Hat JBoss A-MQ<br>6.0.0. It includes bug fixes, which are documented in the readme file<br>included with the patch files.<br>The following security issues are fixed with this release:<br>It was found that XStream could deserialize arbitrary user-supplied XML<br>content, representing objects of any type. A remote attacker able to pass<br>XML to XStream could use this flaw to perform a variety of attacks,<br>including remote code execution in the context of the server running the<br>XStream application. (CVE-2013-7285)<br>It was found that the Apache Camel XSLT component allowed XSL stylesheets<br>to call external Java methods. A remote attacker able to submit messages to<br>a Camel route could use this flaw to perform arbitrary remote code<br>execution in the context of the Camel server process. (CVE-2014-0003)<br>It was found that the Apache Camel XSLT component would resolve entities in<br>XML messages when transforming them using an XSLT route. A remote attacker<br>able to submit messages to an XSLT Camel route could use this flaw to read<br>files accessible to the user running the application server and,<br>potentially, perform other more advanced XML External Entity (XXE) attacks.<br>(CVE-2014-0002)<br>The CVE-2014-0003 and CVE-2014-0002 issues were discovered by David Jorm of<br>the Red Hat Security Response Team.<br>All users of Red Hat JBoss Fuse 6.0.0 and Red Hat JBoss A-MQ 6.0.0 as<br>provided from the Red Hat Customer Portal are advised to apply this patch.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.