First published: Thu Nov 30 2017(Updated: )
Red Hat JBoss BRMS is a business rules management system for the management, storage, creation, modification, and deployment of JBoss Rules.<br>This release of Red Hat JBoss BRMS 6.4.7 serves as a replacement for Red Hat JBoss BRMS 6.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.<br>Security Fix(es):<br><li> A denial of service vulnerability was discovered in ZooKeeper which allows an attacker to dramatically increase CPU utilization by abusing "wchp/wchc" commands, leading to the server being unable to serve legitimate requests. (CVE-2017-5637)</li> <li> It was discovered that the XmlUtils class in jbpmmigration performed expansion of external parameter entities while parsing XML files. A remote attacker could use this flaw to read files accessible to the user running the application server and, potentially, perform other more advanced XML eXternal Entity (XXE) attacks. (CVE-2017-7545)</li> Red Hat would like to thank Man Yue Mo (Semmle) for reporting CVE-2017-7545.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise BRMS Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2017:3354 has a severity rating that indicates it addresses critical issues affecting Red Hat JBoss BRMS.
To fix RHSA-2017:3354, you should upgrade to Red Hat JBoss BRMS 6.4.7 or apply the recommended patches as provided by Red Hat.
RHSA-2017:3354 affects Red Hat JBoss BRMS 6.4.6 and earlier versions.
The update for RHSA-2017:3354 includes various bug fixes and enhancements to improve the performance and stability of Red Hat JBoss BRMS.
Yes, applying RHSA-2017:3354 is recommended for all users of Red Hat JBoss BRMS to mitigate security vulnerabilities.