Lucene search

K
redhatRedHatRHSA-2014:1020
HistoryAug 06, 2014 - 12:00 a.m.

(RHSA-2014:1020) Important: Red Hat JBoss Enterprise Application Platform 6.3.0 update

2014-08-0600:00:00
access.redhat.com
52

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.975 High

EPSS

Percentile

99.9%

Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.

A race condition flaw, leading to heap-based buffer overflows, was found in
the mod_status httpd module. A remote attacker able to access a status page
served by mod_status on a server using a threaded Multi-Processing Module
(MPM) could send a specially crafted request that would cause the httpd
child process to crash or, possibly, allow the attacker to execute
arbitrary code with the privileges of the “apache” user. (CVE-2014-0226)

A denial of service flaw was found in the way httpd’s mod_deflate module
handled request body decompression (configured via the “DEFLATE” input
filter). A remote attacker able to send a request whose body would be
decompressed could use this flaw to consume an excessive amount of system
memory and CPU on the target system. (CVE-2014-0118)

A denial of service flaw was found in the way httpd’s mod_cgid module
executed CGI scripts that did not read data from the standard input.
A remote attacker could submit a specially crafted request that would cause
the httpd child process to hang indefinitely. (CVE-2014-0231)

A flaw was found in the WebSocket08FrameDecoder implementation that could
allow a remote attacker to trigger an Out Of Memory Exception by issuing a
series of TextWebSocketFrame and ContinuationWebSocketFrames. Depending on
the server configuration, this could lead to a denial of service.
(CVE-2014-0193)

It was found that the isCallerInRole() method of the SimpleSecurityManager
did not correctly check caller roles. A remote, authenticated attacker
could use this flaw to circumvent the caller check in applications that use
black list access control based on caller roles. (CVE-2014-3472)

Red Hat would like to thank James Roper of Typesafe for reporting
CVE-2014-0193, and CA Technologies for reporting CVE-2014-3472.

This release of JBoss Enterprise Application Platform also includes bug
fixes and enhancements. Documentation for these changes will be available
shortly from the JBoss Enterprise Application Platform 6.3.0 Release Notes,
linked to in the References.

All users who require JBoss Enterprise Application Platform 6.3.0 on Red
Hat Enterprise Linux 6 should install these new packages. The JBoss server
process must be restarted for the update to take effect.

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.975 High

EPSS

Percentile

99.9%