First published: Thu Jan 30 2020(Updated: )
Apache XML-RPC is a Java implementation of XML-RPC, a popular protocol that uses XML over HTTP to implement remote procedure calls.<br>Security Fix(es):<br><li> xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response (CVE-2019-17570)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-java-common-xmlrpc | <3.1.3-8.17.el7 | 3.1.3-8.17.el7 |
redhat/rh-java-common-xmlrpc-client | <3.1.3-8.17.el7 | 3.1.3-8.17.el7 |
redhat/rh-java-common-xmlrpc-common | <3.1.3-8.17.el7 | 3.1.3-8.17.el7 |
redhat/rh-java-common-xmlrpc-javadoc | <3.1.3-8.17.el7 | 3.1.3-8.17.el7 |
redhat/rh-java-common-xmlrpc-server | <3.1.3-8.17.el7 | 3.1.3-8.17.el7 |
redhat/rh-java-common-xmlrpc | <3.1.3-8.17.el6 | 3.1.3-8.17.el6 |
redhat/rh-java-common-xmlrpc-client | <3.1.3-8.17.el6 | 3.1.3-8.17.el6 |
redhat/rh-java-common-xmlrpc-common | <3.1.3-8.17.el6 | 3.1.3-8.17.el6 |
redhat/rh-java-common-xmlrpc-javadoc | <3.1.3-8.17.el6 | 3.1.3-8.17.el6 |
redhat/rh-java-common-xmlrpc-server | <3.1.3-8.17.el6 | 3.1.3-8.17.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:0310 is considered moderate due to the deserialization vulnerability that can lead to potential exploitation.
To fix RHSA-2020:0310, update the affected packages to version 3.1.3-8.17.el7 or 3.1.3-8.17.el6 as appropriate.
RHSA-2020:0310 addresses the CVE-2019-17570 vulnerability related to the deserialization of server-side exceptions.
Affected packages under RHSA-2020:0310 include rh-java-common-xmlrpc, rh-java-common-xmlrpc-client, rh-java-common-xmlrpc-common, among others.
RHSA-2020:0310 applies to specific Red Hat Enterprise Linux versions, particularly those using the affected XML-RPC packages.