Lucene search

K
redhatRedHatRHSA-2012:1606
HistoryDec 21, 2012 - 12:00 a.m.

(RHSA-2012:1606) Moderate: Fuse Management Console 7.1.0 update

2012-12-2100:00:00
access.redhat.com
33

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.017 Low

EPSS

Percentile

86.2%

The Fuse Management Console is used for managing Fuse ESB Enterprise and
Fuse MQ Enterprise deployments.

This release of Fuse Management Console 7.1.0 serves as a replacement for
Fuse Management Console 1.0.2, and includes bug fixes and enhancements.
Refer to the Fuse Management Console 7.1.0 Release Notes for information on
the most significant of these changes. The Release Notes will be available
shortly from https://access.redhat.com/knowledge/docs/

The following security issue is also fixed with this release:

It was found that the Java hashCode() method implementation was susceptible
to predictable hash collisions. A remote attacker could use this flaw to
cause the Jetty HTTP server (a component of Apache Karaf, used by Fuse
Management Console) to use an excessive amount of CPU time by sending an
HTTP request with a large number of parameters whose names map to the same
hash value. This update introduces a limit of 1000 on the number of
parameters processed per request to mitigate this issue. (CVE-2011-4461)

Red Hat would like to thank oCERT for reporting this issue. oCERT
acknowledges Julian Walde and Alexander Klink as the original reporters.

All users of Fuse Management Console 1.0.2 as provided from the Red Hat
Customer Portal are advised to upgrade to Fuse Management Console 7.1.0.

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.017 Low

EPSS

Percentile

86.2%