Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2011.0951 Important: jbossws-common security update 16 September 2011 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: jbossws-common jbossws-client JBoss Web Services jbossas JBoss Enterprise Application Platform Publisher: Red Hat Operating System: Red Hat Enterprise Linux AS/ES/WS 4 Red Hat Enterprise Linux Server 5 Red Hat Enterprise Linux Server 6 Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2011-1483 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2011-1301.html https://rhn.redhat.com/errata/RHSA-2011-1302.html https://rhn.redhat.com/errata/RHSA-2011-1303.html https://rhn.redhat.com/errata/RHSA-2011-1304.html https://rhn.redhat.com/errata/RHSA-2011-1305.html https://rhn.redhat.com/errata/RHSA-2011-1306.html https://rhn.redhat.com/errata/RHSA-2011-1307.html https://rhn.redhat.com/errata/RHSA-2011-1308.html https://rhn.redhat.com/errata/RHSA-2011-1309.html https://rhn.redhat.com/errata/RHSA-2011-1310.html https://rhn.redhat.com/errata/RHSA-2011-1311.html https://rhn.redhat.com/errata/RHSA-2011-1312.html https://rhn.redhat.com/errata/RHSA-2011-1313.html Comment: This bulletin contains thirteen (13) Red Hat security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jbossws-common security update Advisory ID: RHSA-2011:1301-01 Product: JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1301.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: An updated jbossws-common package that fixes one security issue is now available for JBoss Enterprise Application Platform 5.1.1 for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: JBoss Enterprise Application Platform 5 for RHEL 4 AS - noarch JBoss Enterprise Application Platform 5 for RHEL 4 ES - noarch JBoss Enterprise Application Platform 5 for RHEL 5 Server - noarch JBoss Enterprise Application Platform 5 for RHEL 6 Server - noarch 3. Description: The jbossws-common package provides JBoss Web Services Native, a web service framework included as part of JBoss Enterprise Application Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. This flaw did not affect systems using JBoss Web Services CXF (provided by jbossas-ws-cxf). (CVE-2011-1483) Warning: Before applying this update, please back up your JBoss Enterprise Application Platform's "jboss-as/server/[PROFILE]/deploy/" directory, along with all other customized configuration files. Users of JBoss Web Services Native should upgrade to this updated package, which corrects this issue. The JBoss server process must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 6. Package List: JBoss Enterprise Application Platform 5 for RHEL 4 AS: Source: ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el4.src.rpm noarch: jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el4.noarch.rpm JBoss Enterprise Application Platform 5 for RHEL 4 ES: Source: ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el4.src.rpm noarch: jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el4.noarch.rpm JBoss Enterprise Application Platform 5 for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el5.src.rpm noarch: jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el5.noarch.rpm JBoss Enterprise Application Platform 5 for RHEL 6 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el6.src.rpm noarch: jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOcletXlSAg2UNWIIRApsOAJ0cC4D8ur41WoFh8wLP8K6UH9PkpACfVIUm y+ET3/YIFU8mywAKMXqAH20= =WAar - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jbossws-common security update Advisory ID: RHSA-2011:1302-01 Product: JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1302.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: An updated jbossws-common.jar file for JBoss Enterprise Application Platform 5.1.1 that fixes one security issue is now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Description: JBoss Web Services Native is a web service framework included as part of JBoss Enterprise Application Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. This flaw did not affect systems using JBoss Web Services CXF (provided by jboss-ep-ws-cxf-5.1.1-installer.zip). (CVE-2011-1483) All users of JBoss Enterprise Application Platform 5.1.1 as provided from the Red Hat Customer Portal are advised to install this update. 3. Solution: The References section of this erratum contains a download link (you must log in to download the updated file). Before applying the update, backup your existing JBoss Enterprise Application Platform installation (including all applications and configuration files). The JBoss server process must be restarted for this update to take effect. 4. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 5. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches&product=appplatform&version=5.1.1 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOclfTXlSAg2UNWIIRAnUCAKCV/8y5wMKlt/ta9LAPsU+jyPe7AwCfTphV gGCne8Vn+Ce/Dhyr9zSAIvk= =o/Cf - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jbossws-common security update Advisory ID: RHSA-2011:1303-01 Product: JBoss Enterprise Web Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1303.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: An updated jbossws-common package that fixes one security issue is now available for JBoss Enterprise Web Platform 5.1.1 for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: JBoss Enterprise Web Platform 5 for RHEL 4 AS - noarch JBoss Enterprise Web Platform 5 for RHEL 4 ES - noarch JBoss Enterprise Web Platform 5 for RHEL 5 Server - noarch JBoss Enterprise Web Platform 5 for RHEL 6 Server - noarch 3. Description: The jbossws-common package provides JBoss Web Services Native, a web service framework included as part of JBoss Enterprise Web Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. This flaw did not affect systems using JBoss Web Services CXF (provided by jbossas-ws-cxf-ewp). (CVE-2011-1483) Warning: Before applying this update, please back up your JBoss Enterprise Web Platform's "jboss-as-web/server/[PROFILE]/deploy/" directory, along with all other customized configuration files. Users of JBoss Web Services Native should upgrade to this updated package, which corrects this issue. The JBoss server process must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 6. Package List: JBoss Enterprise Web Platform 5 for RHEL 4 AS: Source: jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el4.src.rpm noarch: jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el4.noarch.rpm JBoss Enterprise Web Platform 5 for RHEL 4 ES: Source: jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el4.src.rpm noarch: jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el4.noarch.rpm JBoss Enterprise Web Platform 5 for RHEL 5 Server: Source: jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el5.src.rpm noarch: jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el5.noarch.rpm JBoss Enterprise Web Platform 5 for RHEL 6 Server: Source: jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el6.src.rpm noarch: jbossws-common-1.1.0-4.SP7_patch_02.1.ep5.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOclgGXlSAg2UNWIIRAgKRAKCv196Jofr+2iWHW4/mcJ5noN/WjACff7TJ JQMVjwxlHR/Yg/fZX3Wshxk= =AtSa - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jbossws-common security update Advisory ID: RHSA-2011:1304-01 Product: JBoss Enterprise Web Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1304.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: An updated jbossws-common.jar file for JBoss Enterprise Web Platform 5.1.1 that fixes one security issue is now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Description: JBoss Web Services Native is a web service framework included as part of JBoss Enterprise Web Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. This flaw did not affect systems using JBoss Web Services CXF (provided by jboss-ep-ws-cxf-5.1.1-installer.zip). (CVE-2011-1483) All users of JBoss Enterprise Web Platform 5.1.1 as provided from the Red Hat Customer Portal are advised to install this update. 3. Solution: The References section of this erratum contains a download link (you must log in to download the updated file). Before applying the update, backup your existing JBoss Enterprise Web Platform installation (including all applications and configuration files). The JBoss server process must be restarted for this update to take effect. 4. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 5. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=enterpriseweb.platform&downloadType=securityPatches&version=5.1.1 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOclgyXlSAg2UNWIIRAqnWAJ9pZnTsOa/VyxGBT/Qv1QWByGDGhQCffu2d g/yHOU+kxAsjdo4aG7vLeJo= =GkUo - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jbossws security update Advisory ID: RHSA-2011:1305-01 Product: JBoss Enterprise Middleware Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1305.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: Updated jbossws-client.jar, jbossws-common.jar, jbossws-core.jar, and jbossws-native-core.jar files for JBoss Enterprise SOA Platform 4.2.CP05, 4.3.CP05, and 5.1.0 that fix one security issue are now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Description: JBoss Web Services Native is a web service framework included as part of JBoss Enterprise SOA Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. (CVE-2011-1483) All users of JBoss Enterprise SOA Platform 4.2.CP05, 4.3.CP05, and 5.1.0 as provided from the Red Hat Customer Portal are advised to install this update. 3. Solution: The References section of this erratum contains download links (you must log in to download the updated files). Before applying the update, back up your existing JBoss Enterprise SOA Platform installation (including its databases, applications, configuration files, and so on). The updates for JBoss Enterprise SOA Platform 4.2.CP05 and 4.3.CP05 contain updated jbossws-client.jar, jbossws-common.jar, and jbossws-core.jar files. The update for JBoss Enterprise SOA Platform 5.1.0 contains updated jbossws-common.jar and jbossws-native-core.jar files. Refer to the "README.text" file in each download for installation instructions. Note that it is recommended to halt the JBoss Enterprise SOA Platform server by stopping the JBoss Application Server process before installing this update, and then after installing the update, restart the JBoss Enterprise SOA Platform server by starting the JBoss Application Server process. 4. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 5. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform&downloadType=securityPatches&version=4.2.0.GA_CP05 https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform&downloadType=securityPatches&version=4.3.0.GA_CP05 https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform&downloadType=securityPatches&version=5.1.0+GA 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOclibXlSAg2UNWIIRAldUAKDA/ZLuuvAxUxR5Se2wNR/Z4dTfvACgn9HW 3XlvpJaDOsaru4Xe8r9J2Js= =KEt8 - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jbossws-common security update Advisory ID: RHSA-2011:1306-01 Product: JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1306.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: An updated jbossws-common package that fixes one security issue is now available for JBoss Enterprise Application Platform 4.3 for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS - noarch JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES - noarch JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server - noarch 3. Description: The jbossws-common package provides JBoss Web Services Native, a web service framework included as part of JBoss Enterprise Application Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. (CVE-2011-1483) Warning: Before applying this update, please back up your JBoss Enterprise Application Platform's "jboss-as/server/[PROFILE]/deploy/" directory, along with all other customized configuration files. Users of JBoss Enterprise Application Platform 4.3 for Red Hat Enterprise Linux 4 and 5 should upgrade to this updated package, which corrects this issue. The JBoss server process must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 6. Package List: JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS: Source: ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossws-common-1.0.0-5.GA_CP07_patch_01.1.ep1.el4.src.rpm noarch: jbossws-common-1.0.0-5.GA_CP07_patch_01.1.ep1.el4.noarch.rpm JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES: Source: ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossws-common-1.0.0-5.GA_CP07_patch_01.1.ep1.el4.src.rpm noarch: jbossws-common-1.0.0-5.GA_CP07_patch_01.1.ep1.el4.noarch.rpm JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossws-common-1.0.0-5.GA_CP07_patch_01.1.ep1.el5.src.rpm noarch: jbossws-common-1.0.0-5.GA_CP07_patch_01.1.ep1.el5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOcllBXlSAg2UNWIIRAopPAJ0bO4nBXFRsU3c0twDUgUQao/mQjwCgqXcd fEY/DLby4L6SMM2Y1YCGVhk= =Z2G3 - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jbossws security update Advisory ID: RHSA-2011:1307-01 Product: JBoss Enterprise Middleware Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1307.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: Updated jbossws-client.jar, jbossws-common.jar, and jbossws-core.jar files for JBoss Enterprise Portal Platform 4.3.CP06 that fix one security issue are now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Description: JBoss Web Services Native is a web service framework included as part of JBoss Enterprise Portal Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. (CVE-2011-1483) All users of JBoss Enterprise Portal Platform 4.3.CP06 as provided from the Red Hat Customer Portal are advised to install this update. 3. Solution: The References section of this erratum contains a download link (you must log in to download the updated files). Before applying the update, back up all applications deployed on JBoss Enterprise Portal Platform, along with all customized configuration files. The JBoss server process must be restarted for this update to take effect. 4. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 5. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal&downloadType=securityPatches&version=4.3+CP06 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOcll3XlSAg2UNWIIRAid2AKDFO9nKZ7ZrEKXANZiWwa0yOqCcKQCcDeMF lhHIQ0qCmGzuAcP8iL+K5Ho= =GKmf - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: JBoss Communications Platform 1.2.11 and 5.1.1 security update Advisory ID: RHSA-2011:1308-01 Product: JBoss Enterprise Middleware Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1308.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: An updated JBoss Web Services Native component for JBoss Communications Platform 1.2.11 and 5.1.1 that fixes one security issue is now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Description: JBoss Web Services Native is a web service framework included as part of JBoss Communications Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. (CVE-2011-1483) All users of JBoss Communications Platform 1.2.11 and 5.1.1 as provided from the Red Hat Customer Portal are advised to install this update. 3. Solution: The References section of this erratum contains download links (you must log in to download the update). Before applying the update, backup your existing JBoss Communications Platform installation (including its databases, applications, configuration files, and so on). The JBoss Application Server process must be restarted for the update to take effect. 4. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 5. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches&product=communications.platform&version=1.2.11+GA https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=communications.platform&downloadType=securityPatches&version=5.1.1+GA 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOclmzXlSAg2UNWIIRAjULAJ479x+NPULz0WGteG9G744BCzKKjACfeet1 EWJQfbRuMlcWyb2ZcbbCO7o= =tiOF - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jbossas security update Advisory ID: RHSA-2011:1309-01 Product: JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1309.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: Updated jbossas packages that fix one security issue are now available for JBoss Enterprise Application Platform 4.2.0.CP09 for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS - noarch JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES - noarch JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server - noarch 3. Description: JBoss Enterprise Application Platform is the market-leading platform for innovative and scalable Java applications. JBoss Enterprise Application Platform integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam into a complete and simple enterprise solution. JBoss Web Services Native is a web service framework included as part of JBoss Enterprise Application Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. (CVE-2011-1483) Warning: Before applying this update, please back up your JBoss Enterprise Application Platform's "server/[configuration]/deploy/" directory, along with all other customized configuration files. Users of JBoss Enterprise Application Platform 4.2.0.CP09 on Red Hat Enterprise Linux 4 and 5 should upgrade to these updated packages, which correct this issue. The JBoss server process must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 6. Package List: JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS: Source: ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossas-4.2.0-6.GA_CP09.11.ep1.el4.src.rpm noarch: jbossas-4.2.0-6.GA_CP09.11.ep1.el4.noarch.rpm jbossas-4.2.0.GA_CP09-bin-4.2.0-6.GA_CP09.11.ep1.el4.noarch.rpm jbossas-client-4.2.0-6.GA_CP09.11.ep1.el4.noarch.rpm JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES: Source: ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossas-4.2.0-6.GA_CP09.11.ep1.el4.src.rpm noarch: jbossas-4.2.0-6.GA_CP09.11.ep1.el4.noarch.rpm jbossas-4.2.0.GA_CP09-bin-4.2.0-6.GA_CP09.11.ep1.el4.noarch.rpm jbossas-client-4.2.0-6.GA_CP09.11.ep1.el4.noarch.rpm JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossas-4.2.0-6.GA_CP09.11.1.ep1.el5.src.rpm noarch: jbossas-4.2.0-6.GA_CP09.11.1.ep1.el5.noarch.rpm jbossas-4.2.0.GA_CP09-bin-4.2.0-6.GA_CP09.11.1.ep1.el5.noarch.rpm jbossas-client-4.2.0-6.GA_CP09.11.1.ep1.el5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOclqmXlSAg2UNWIIRAj9MAKCv0t8jxMcGIj2jf2HOfVzbQfEbpACbBzHs M6Hf5hHXmaFCsyCM+teZdF4= =QFz8 - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jbossws security update Advisory ID: RHSA-2011:1310-01 Product: JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1310.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: Updated jbossws-client.jar, jbossws-core.jar, jbossws-integration.jar, and jbossws-jboss42-integration.jar files for JBoss Enterprise Application Platform 4.2.0.CP09 that fix one security issue are now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Description: JBoss Web Services Native is a web service framework included as part of JBoss Enterprise Application Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. (CVE-2011-1483) All users of JBoss Enterprise Application Platform 4.2.0.CP09 as provided from the Red Hat Customer Portal are advised to install this update. 3. Solution: The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, backup your existing JBoss Enterprise Application Platform installation (including all applications and configuration files). The JBoss server process must be restarted for this update to take effect. 4. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 5. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=4.2.0.GA_CP09 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOclq3XlSAg2UNWIIRAgYPAJ4vOIhrF9X34CeOMuUhDHx5gukesQCdEQb+ +EDdjl6rsQcZB23GnhR0RuY= =0XRM - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jbossws-common security update Advisory ID: RHSA-2011:1311-01 Product: JBoss Enterprise Middleware Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1311.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: An updated jbossws-common.jar file for JBoss Enterprise Portal Platform 5.1.1 that fixes one security issue is now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Description: JBoss Web Services Native is a web service framework included as part of JBoss Enterprise Portal Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. (CVE-2011-1483) All users of JBoss Enterprise Portal Platform 5.1.1 as provided from the Red Hat Customer Portal are advised to install this update. 3. Solution: The References section of this erratum contains a download link (you must log in to download the updated file). Before applying the update, back up all applications deployed on JBoss Enterprise Portal Platform, along with all customized configuration files. The JBoss server process must be restarted for this update to take effect. 4. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 5. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal&downloadType=securityPatches&version=5.1.1 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOclrxXlSAg2UNWIIRAqidAJ4+S6ar+qMoDMfIZUdj0e66hwPUBQCfbcj+ mOfCrdqZDGuCSWfick5tc/Q= =SaRZ - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: jbossws-common security update Advisory ID: RHSA-2011:1312-01 Product: JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1312.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: An updated JBoss Enterprise Application Platform 4.3 that fixes one security issue is now available from the Red Hat Customer Portal as JBoss Enterprise Application Platform 4.3.0 Cumulative Patch 10. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Description: JBoss Web Services Native is a web service framework included as part of JBoss Enterprise Application Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. (CVE-2011-1483) All users of JBoss Enterprise Application Platform 4.3 as provided from the Red Hat Customer Portal are advised to install this update. 3. Solution: The References section of this erratum contains a download link (you must log in to download the updated file). Before applying the update, backup your existing JBoss Enterprise Application Platform installation (including all applications and configuration files). The JBoss server process must be restarted for this update to take effect. 4. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 5. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=appplatform&version=4.3.0.GA_CP10 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOclsfXlSAg2UNWIIRAk6xAJ9X65bEkTPD6JyjcwE9GeZT2tOGvgCeJz7D wOo74qHU9ipSF6I3JAPoMD0= =MJrT - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: JBoss Enterprise BRMS Platform 5.1.0 security update Advisory ID: RHSA-2011:1313-01 Product: JBoss Enterprise Middleware Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1313.html Issue date: 2011-09-15 CVE Names: CVE-2011-1483 ===================================================================== 1. Summary: An updated JBoss Web Services Native component for JBoss Enterprise BRMS Platform 5.1.0 that fixes one security issue is now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Description: JBoss Web Services Native is a web service framework included as part of JBoss Enterprise BRMS Platform. It implements the JAX-WS specification. It was found that JBoss Web Services Native did not properly protect against recursive entity resolution when processing Document Type Definitions (DTD). A remote attacker could exploit this flaw by sending a specially-crafted HTTP POST request to a deployed web service, causing excessive CPU and memory consumption on the system hosting that service. If the attack is repeated to consume all available network sockets, the server will become unavailable. (CVE-2011-1483) All users of JBoss Enterprise BRMS Platform 5.1.0 as provided from the Red Hat Customer Portal are advised to install this update. 3. Solution: The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, backup your existing JBoss Enterprise BRMS Platform installation (including its databases, applications, configuration files, and so on). Note that it is recommended to halt the JBoss Enterprise BRMS Platform server by stopping the JBoss Application Server process before installing this update, and then after installing the update, restart the JBoss Enterprise BRMS Platform server by starting the JBoss Application Server process. 4. Bugs fixed (http://bugzilla.redhat.com/): 692584 - CVE-2011-1483 JBossWS remote Denial of Service 5. References: https://www.redhat.com/security/data/cve/CVE-2011-1483.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms&downloadType=securityPatches&version=5.1.0 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOcltJXlSAg2UNWIIRAuYtAJ9xtIvwoHd5Lum6Cjn5SjybQH81KwCfdnUt rz2XLCHMWqSAiw0hwNWaFno= =B18S - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBTnKkN+4yVqjM2NGpAQLlcRAAh6zmtxDRVtU49nFymHoM+sdmINs8IfWW X7inu+e3MQsBn8xoPFi+lT4pXX5tpTYKnxnLs2LqLTEZraraXfz6NtoZn5dd6Bk+ gQVM05eR5cMHUTsYXCwaqQojOwdO9OoYQDKSpEyfVhKIi+xURQCJ/kZ3flYHInH+ jHRiSVQBGvxfMsWB0PD/TXSkjcKcc37BdLCtaCmbckWgwoohyUEHzlTWnqdp7wpP JCIDV8uqC6P/Hf0uNp4a+lHhLB8K7DOQ6tfP6ZqHtYM6zCCJGtOBlyhLS7Pu/UDE jIh93cGEA5nRAP9sM0kpKmaBOPZ8iqFHruzoMrVqW4HXw+9rh23BI3hYeCqAP/K/ Huv+QIsRpK/gmgZ47SL0p3nBqQm+cQ4FEpySiIFd4mLxyHjhD9t4sIcBw0SBIIIA nlLbbnBP9OAOAXvjFILO70IFulmKxZvFpjYRklYUw6L/OCu1hNMgA9P4aCXgbpRN GrHx0EjoHoYkdF9u2dnec8Y5/zx5DMqOVydPAwuuDodfVsNg2TzZCp/N5fLzoc9R lRkcS+RDb+ubNRvowCyjMdQz1nIYqEga8ZShWE+vP0cD4CzD6hEfw9YdhynLBIy1 UXUkp8MRz7mqssnKe10e+iPx0bdgtb512lEsESOgo4MffR3UwCNySWkot7OEIMAt brNc5JKofGk= =1aIs -----END PGP SIGNATURE-----