First published: Wed Apr 30 2014(Updated: )
Fuse ESB Enterprise is an integration platform based on Apache ServiceMix.<br>Fuse MQ Enterprise, based on Apache ActiveMQ, is a standards-compliant<br>messaging system that is tailored for use in mission critical applications.<br>This release of Fuse ESB Enterprise/MQ Enterprise 7.1.0 R1 P3 is an update<br>to Fuse ESB Enterprise 7.1.0 and Fuse MQ Enterprise 7.1.0. It includes<br>various bug fixes, which are listed in the README file included with the<br>patch files.<br>The following security issues are also addressed with this release:<br>It was found that XStream could deserialize arbitrary user-supplied XML<br>content, representing objects of any type. A remote attacker able to pass<br>XML to XStream could use this flaw to perform a variety of attacks,<br>including remote code execution in the context of the server running the<br>XStream application. (CVE-2013-7285)<br>It was found that the Apache Camel XSLT component allowed XSL stylesheets<br>to call external Java methods. A remote attacker able to submit messages to<br>a Camel route could use this flaw to perform arbitrary remote code<br>execution in the context of the Camel server process. (CVE-2014-0003)<br>It was found that the ParserPool and Decrypter classes in the OpenSAML Java<br>implementation resolved external entities, permitting XML External Entity<br>(XXE) attacks. A remote attacker could use this flaw to read files<br>accessible to the user running the application server and, potentially,<br>perform other more advanced XXE attacks. (CVE-2013-6440)<br>It was found that the Apache Camel XSLT component would resolve entities in<br>XML messages when transforming them using an XSLT route. A remote attacker<br>able to submit messages to an XSLT Camel route could use this flaw to read<br>files accessible to the user running the application server and,<br>potentially, perform other more advanced XXE attacks. (CVE-2014-0002)<br>A denial of service flaw was found in the way Apache Commons FileUpload<br>handled small-sized buffers used by MultipartStream. A remote attacker<br>could use this flaw to create a malformed Content-Type header for a<br>multipart request, causing Apache Commons FileUpload to enter an infinite<br>loop when processing such an incoming request. (CVE-2014-0050)<br>The CVE-2014-0002 and CVE-2014-0003 issues were discovered by David Jorm of<br>the Red Hat Security Response Team, and the CVE-2013-6440 issue was<br>discovered by David Illsley, Ron Gutierrez of Gotham Digital Science, and<br>David Jorm of the Red Hat Security Response Team.<br>All users of Fuse ESB Enterprise/MQ Enterprise 7.1.0 as provided from the<br>Red Hat Customer Portal are advised to upgrade to Fuse ESB Enterprise/MQ<br>Enterprise 7.1.0 R1 P3.<br>
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.