First published: Thu Dec 18 2014(Updated: )
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java<br>applications based on JBoss Application Server 7.<br>It was discovered that the Apache CXF incorrectly extracted the host name<br>from an X.509 certificate subject's Common Name (CN) field.<br>A man-in-the-middle attacker could use this flaw to spoof an SSL server<br>using a specially crafted X.509 certificate. (CVE-2012-6153, CVE-2014-3577)<br>It was found that Apache WSS4J (Web Services Security for Java), as used by<br>Apache CXF with the TransportBinding, did not, by default, properly enforce<br>all security requirements associated with SAML SubjectConfirmation methods.<br>A remote attacker could use this flaw to perform various types of spoofing<br>attacks on web service endpoints secured by WSS4j that rely on SAML for<br>authentication. (CVE-2014-3623)<br>The CVE-2012-6153 issue was discovered by Florian Weimer of Red Hat<br>Product Security.<br>All users of Red Hat JBoss Enterprise Application Platform 6.3.2 on Red<br>Hat Enterprise Linux 5, 6, and 7 are advised to upgrade to these updated<br>packages. The JBoss server process must be restarted for the update to<br>take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/apache-cxf | <2.7.12-1.SP1_redhat_5.1.ep6.el6 | 2.7.12-1.SP1_redhat_5.1.ep6.el6 |
redhat/wss4j | <1.6.16-2.redhat_3.1.ep6.el6 | 1.6.16-2.redhat_3.1.ep6.el6 |
redhat/apache-cxf | <2.7.12-1.SP1_redhat_5.1.ep6.el6 | 2.7.12-1.SP1_redhat_5.1.ep6.el6 |
redhat/wss4j | <1.6.16-2.redhat_3.1.ep6.el6 | 1.6.16-2.redhat_3.1.ep6.el6 |
redhat/apache-cxf | <2.7.12-1.SP1_redhat_5.1.ep6.el7 | 2.7.12-1.SP1_redhat_5.1.ep6.el7 |
redhat/wss4j | <1.6.16-2.redhat_3.1.ep6.el7 | 1.6.16-2.redhat_3.1.ep6.el7 |
redhat/apache-cxf | <2.7.12-1.SP1_redhat_5.1.ep6.el7 | 2.7.12-1.SP1_redhat_5.1.ep6.el7 |
redhat/wss4j | <1.6.16-2.redhat_3.1.ep6.el7 | 1.6.16-2.redhat_3.1.ep6.el7 |
redhat/apache-cxf | <2.7.12-1.SP1_redhat_5.1.ep6.el5 | 2.7.12-1.SP1_redhat_5.1.ep6.el5 |
redhat/wss4j | <1.6.16-2.redhat_3.1.ep6.el5 | 1.6.16-2.redhat_3.1.ep6.el5 |
redhat/apache-cxf | <2.7.12-1.SP1_redhat_5.1.ep6.el5 | 2.7.12-1.SP1_redhat_5.1.ep6.el5 |
redhat/wss4j | <1.6.16-2.redhat_3.1.ep6.el5 | 1.6.16-2.redhat_3.1.ep6.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.