First published: Tue Mar 24 2020(Updated: )
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.<br>Security Fix(es):<br><li> The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use (CVE-2019-14887) </li> <li> libthrift: thrift: Endless loop when feed with specific input data (CVE-2019-0205)</li> <li> libthrift: thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol (CVE-2019-0210)</li> <li> undertow: AJP File Read/Inclusion Vulnerability (CVE-2020-1745)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | <=7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:0961 is classified as moderate due to the impact of the insecure handling of enabled protocols.
To fix RHSA-2020:0961, you should apply the latest updates provided by Red Hat for JBoss Enterprise Application Platform 7.
RHSA-2020:0961 addresses the vulnerability where the 'enabled-protocols' value is not respected when using the OpenSSL security provider (CVE-2019-14887).
RHSA-2020:0961 affects Red Hat JBoss Enterprise Application Platform 7 when OpenSSL is used as the security provider.
There is no officially recommended workaround for RHSA-2020:0961; applying the updates is the preferred resolution.