-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.0122
        Important: JBoss Enterprise Portal Platform 4.3 CP07 update
                              3 February 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           JBoss Enterprise Middleware
Publisher:         Red Hat
Operating System:  Red Hat
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Access Privileged Data          -- Existing Account            
                   Denial of Service               -- Remote/Unauthenticated      
                   Unauthorised Access             -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2011-5064 CVE-2011-5063 CVE-2011-5062
                   CVE-2011-4858 CVE-2011-4085 CVE-2011-2526
                   CVE-2011-1484 CVE-2011-1184 

Reference:         ESB-2012.0103
                   ESB-2012.0102
                   ESB-2012.0073
                   ESB-2011.1271
                   ESB-2011.1258
                   ESB-2011.1224
                   ESB-2011.1197
                   ESB-2011.1158
                   ESB-2011.0975
                   ESB-2011.0906
                   ESB-2011.0839
                   ESB-2011.0736
                   ESB-2011.0726
                   ESB-2011.0461
                   ESB-2011.0460
                   ESB-2011.0459
                   ESB-2011.0458
                   ASB-2011.0064.2
                   ESB-2012.0112.2

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2012-0091.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: JBoss Enterprise Portal Platform 4.3 CP07 update
Advisory ID:       RHSA-2012:0091-01
Product:           JBoss Enterprise Middleware
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2012-0091.html
Issue date:        2012-02-02
CVE Names:         CVE-2011-1184 CVE-2011-1484 CVE-2011-2526 
                   CVE-2011-4085 CVE-2011-4858 CVE-2011-5062 
                   CVE-2011-5063 CVE-2011-5064 
=====================================================================

1. Summary:

JBoss Enterprise Portal Platform 4.3 CP07, which fixes multiple security
issues and various bugs, is now available from the Red Hat Customer Portal.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

2. Description:

JBoss Enterprise Portal Platform is the open source implementation of the
Java EE suite of services and Portal services running atop JBoss Enterprise
Application Platform. It comprises a set of offerings for enterprise
customers who are looking for pre-configured profiles of JBoss Enterprise
Middleware components that have been tested and certified together to
provide an integrated experience.

This JBoss Enterprise Portal Platform 4.3 CP07 release serves as a
replacement for JBoss Enterprise Portal Platform 4.3 CP06. Refer to the
JBoss Enterprise Portal Platform 4.3 CP07 Release Notes, available shortly
from docs.redhat.com, for information on the most significant bug fixes
included in this release.

The following security fixes are also included:

JBoss Seam 2 did not properly block access to JBoss Expression Language
(EL) constructs in page exception handling, allowing arbitrary Java methods
to be executed. A remote attacker could use this flaw to execute arbitrary
code via a specially-crafted URL provided to certain applications based on
the JBoss Seam 2 framework. Note: A properly configured and enabled Java
Security Manager would prevent exploitation of this flaw. (CVE-2011-1484)

Note: If you have created custom applications that are packaged with a copy
of the JBoss Seam 2 library, those applications must be rebuilt with the
updated jboss-seam.jar file provided by this update.

It was found that the Java hashCode() method implementation was
susceptible to predictable hash collisions. A remote attacker could use
this flaw to cause JBoss Web to use an excessive amount of CPU time by
sending an HTTP request with a large number of parameters whose names map
to the same hash value. This update introduces a limit on the number of
parameters and headers processed per request to mitigate this issue. The
default limit is 512 for parameters and 128 for headers. These defaults
can be changed by setting the
org.apache.tomcat.util.http.Parameters.MAX_COUNT and
org.apache.tomcat.util.http.MimeHeaders.MAX_COUNT system properties in
"server/$PROFILE/deploy/properties-service.xml". (CVE-2011-4858)

Multiple flaws were found in the way JBoss Web handled HTTP DIGEST
authentication. These flaws weakened the JBoss Web HTTP DIGEST
authentication implementation, subjecting it to some of the weaknesses of
HTTP BASIC authentication, for example, allowing remote attackers to
perform session replay attacks. (CVE-2011-1184, CVE-2011-5062,
CVE-2011-5063, CVE-2011-5064)

The invoker servlets, deployed by default via httpha-invoker, only
performed access control on the HTTP GET and POST methods, allowing remote
attackers to make unauthenticated requests by using different HTTP methods.
Due to the second layer of authentication provided by a security
interceptor, this issue is not exploitable on default installations unless
an administrator has misconfigured the security interceptor or disabled it.
(CVE-2011-4085)

A flaw was found in the way JBoss Web handled sendfile request attributes
when using the HTTP APR (Apache Portable Runtime) or NIO (Non-Blocking I/O)
connector. A malicious web application running on a JBoss Web instance
could use this flaw to bypass security manager restrictions and gain access
to files it would otherwise be unable to access, or possibly terminate the
Java Virtual Machine (JVM). (CVE-2011-2526)

Red Hat would like to thank Martin Kouba from IT SYSTEMS a.s. for reporting
CVE-2011-1484; oCERT for reporting CVE-2011-4858; and the Apache Tomcat
project for reporting CVE-2011-2526. oCERT acknowledges Julian Wälde and
Alexander Klink as the original reporters of CVE-2011-4858.

Warning: Before applying this update, back up all applications deployed on
JBoss Enterprise Portal Platform, along with all customized configuration
files.

All users of JBoss Enterprise Portal Platform 4.3 CP06 as provided from the
Red Hat Customer Portal are advised to upgrade to JBoss Enterprise Portal
Platform 4.3 CP07.

3. Solution:

The References section of this erratum contains a download link (you must
log in to download the update).

The JBoss server process must be restarted for this update to take effect.
Note that if you have created custom applications that are packaged with a
copy of the JBoss Seam 2 library, those applications must be rebuilt with
the updated jboss-seam.jar file provided by this update.

4. Bugs fixed (http://bugzilla.redhat.com/):

692421 - CVE-2011-1484 JBoss Seam privilege escalation caused by EL interpolation in FacesMessages
720948 - CVE-2011-2526 tomcat: security manager restrictions bypass
741401 - CVE-2011-1184 CVE-2011-5062 CVE-2011-5063 CVE-2011-5064 tomcat: Multiple weaknesses in HTTP DIGEST authentication
750422 - CVE-2011-4085 Invoker servlets authentication bypass (HTTP verb tampering)
750521 - CVE-2011-4858 tomcat: hash table collisions CPU usage DoS (oCERT-2011-003)

5. References:

https://www.redhat.com/security/data/cve/CVE-2011-1184.html
https://www.redhat.com/security/data/cve/CVE-2011-1484.html
https://www.redhat.com/security/data/cve/CVE-2011-2526.html
https://www.redhat.com/security/data/cve/CVE-2011-4085.html
https://www.redhat.com/security/data/cve/CVE-2011-4858.html
https://www.redhat.com/security/data/cve/CVE-2011-5062.html
https://www.redhat.com/security/data/cve/CVE-2011-5063.html
https://www.redhat.com/security/data/cve/CVE-2011-5064.html
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=jbportal&version=4.3+CP07
https://docs.redhat.com/docs/en-US/index.html

6. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFPKxPBXlSAg2UNWIIRAhb4AJ9Ks5/uus0s8PacXmno8u4QexJjkgCfap76
nuOq8z4B/1ANHDcKjdHi/Go=
=H33V
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBTytIk+4yVqjM2NGpAQLhPA/9HhucIyxWDDdvPfUJKB4zwKTKueQkNw3T
aDQlSnZMXYZh/9P6hLXQwtM/ol833jzt5LpFm20hbKJIuWPmwysObkr/5k9ga8pz
Bg38TpKIbbm8/obKnwnlw3HDH9qxy08gpdjCDx4bEicYfBahYE0iUMIGeUJwETmN
MnGFiRAdg4yffxEFLG3wQmeQ3/aq1OywBXHmvHw2e3XE+n3f69aQiyvgG26yoR1i
2Td2ngLK9aIBUIljJkiVODY8V0tvjsRxnlMD1TSLo7StcBQkLoqG2MR+ociWGrmu
eDjsYfz5pQy+nNiskyawRdyFrnlEoKD0XUjw/3n/2LFSwqIZwp3I4lUVg3+Ksc8S
etsQnv2arOnEdrvCZZ9yLV7gs/NToRlEY6YqM8RrswT6tbPwuIawXw0c+jBcHHCg
GdIRtXYA7fnE9LI9iBmfetKdqKWBkl3oqPkVfTPU48tC2fD2vVYTPt+arcMrkZn0
0jhTGLVtijbYWXcvnKKhV6Aosg9MkxCU4rAZ7qTZ3/ZpIlj65yCw4j8ZHsgbpWTw
gh3dIQknEFgIErxG1EztnCu+Hgt+85NsEt+/jVL+fzg7URZy0uvRW7+IRbdOQN0x
JLRsL7qrrXMRfFwxJMZFg5uS8yEBJpYSpVXa0OXFQphleTaKvfOfA1zfXbyqhomO
Px7tqOYNieE=
=jBmj
-----END PGP SIGNATURE-----