Advisory Published

RHSA-2014:0818: Important: Red Hat JBoss BRMS 6.0.2 update

First published: Mon Jun 30 2014(Updated: )

Red Hat JBoss BRMS is a business rules management system for the<br>management, storage, creation, modification, and deployment of JBoss Rules.<br>This release of Red Hat JBoss BRMS 6.0.2 serves as a replacement for Red<br>Hat JBoss BRMS 6.0.1, and includes bug fixes and enhancements. Refer to the<br>Red Hat JBoss BRMS 6.0.2 Release Notes for information on the most<br>significant of these changes. The Release Notes will be available shortly<br>at <a href="https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_BRMS/" target="_blank">https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_BRMS/</a> The following security issues are fixed with this release:<br>It was found that the secure processing feature of Xalan-Java had<br>insufficient restrictions defined for certain properties and features.<br>A remote attacker able to provide Extensible Stylesheet Language<br>Transformations (XSLT) content to be processed by an application using<br>Xalan-Java could use this flaw to bypass the intended constraints of the<br>secure processing feature. Depending on the components available in the<br>classpath, this could lead to arbitrary remote code execution in the<br>context of the application server running the application that uses<br>Xalan-Java. (CVE-2014-0107)<br>It was found that the ServerTrustManager in the Smack XMPP API did not<br>verify basicConstraints and nameConstraints in X.509 certificate chains.<br>A man-in-the-middle attacker could use this flaw to spoof servers and<br>obtain sensitive information. (CVE-2014-0363)<br>It was found that the ParseRoster component in the Smack XMPP API did not<br>verify the From attribute of a roster-query IQ stanza. A remote attacker<br>could use this flaw to spoof IQ responses. (CVE-2014-0364)<br>A flaw was found in the WebSocket08FrameDecoder implementation that could<br>allow a remote attacker to trigger an Out Of Memory Exception by issuing a<br>series of TextWebSocketFrame and ContinuationWebSocketFrames. Depending on<br>the server configuration, this could lead to a denial of service.<br>(CVE-2014-0193)<br>Red Hat would like to thank James Roper of Typesafe for reporting the<br>CVE-2014-0193 issue.<br>All users of Red Hat JBoss BRMS 6.0.1 as provided from the Red Hat Customer<br>Portal are advised to upgrade to Red Hat JBoss BRMS 6.0.2.

Affected SoftwareAffected VersionHow to fix

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203