RHEL 6 : JBoss EAP (RHSA-2014:1020)

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated Red Hat JBoss Enterprise Application Platform 6.3.0 packages
that fix multiple security issues, several bugs, and add various
enhancements are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS)
base scores, which give detailed severity ratings, are available for
each vulnerability from the CVE links in the References section.

Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.

A race condition flaw, leading to heap-based buffer overflows, was
found in the mod_status httpd module. A remote attacker able to access
a status page served by mod_status on a server using a threaded
Multi-Processing Module (MPM) could send a specially crafted request
that would cause the httpd child process to crash or, possibly, allow
the attacker to execute arbitrary code with the privileges of the
'apache' user. (CVE-2014-0226)

A denial of service flaw was found in the way httpd's mod_deflate
module handled request body decompression (configured via the
'DEFLATE' input filter). A remote attacker able to send a request
whose body would be decompressed could use this flaw to consume an
excessive amount of system memory and CPU on the target system.

A denial of service flaw was found in the way httpd's mod_cgid module
executed CGI scripts that did not read data from the standard input. A
remote attacker could submit a specially crafted request that would
cause the httpd child process to hang indefinitely. (CVE-2014-0231)

A flaw was found in the WebSocket08FrameDecoder implementation that
could allow a remote attacker to trigger an Out Of Memory Exception by
issuing a series of TextWebSocketFrame and
ContinuationWebSocketFrames. Depending on the server configuration,
this could lead to a denial of service. (CVE-2014-0193)

It was found that the isCallerInRole() method of the
SimpleSecurityManager did not correctly check caller roles. A remote,
authenticated attacker could use this flaw to circumvent the caller
check in applications that use black list access control based on
caller roles. (CVE-2014-3472)

Red Hat would like to thank James Roper of Typesafe for reporting
CVE-2014-0193, and CA Technologies for reporting CVE-2014-3472.

This release of JBoss Enterprise Application Platform also includes
bug fixes and enhancements. Documentation for these changes will be
available shortly from the JBoss Enterprise Application Platform 6.3.0
Release Notes, linked to in the References.

All users who require JBoss Enterprise Application Platform 6.3.0 on
Red Hat Enterprise Linux 6 should install these new packages. The
JBoss server process must be restarted for the update to take effect.

See also :


Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 77079 ()

Bugtraq ID: 67182

CVE ID: CVE-2014-0118

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now