First published: Tue Aug 04 2020(Updated: )
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.<br>This release of Red Hat JBoss Web Server 3.1 Service Pack 10 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.<br>Security Fix(es):<br><li> tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS (CVE-2020-13935)</li> <li> tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling (CVE-2020-1935) </li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Web Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:3305 is classified as Important.
To fix RHSA-2020:3305, you should apply the available updates for Red Hat JBoss Web Server as recommended in the advisory.
RHSA-2020:3305 affects Red Hat JBoss Web Server, which includes components like Apache HTTP Server and Apache Tomcat.
Yes, RHSA-2020:3305 addresses known vulnerabilities identified in the affected components.
There may not be a specific workaround for RHSA-2020:3305, so updating to the patched version is strongly advised.