exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2017-3456-01

Red Hat Security Advisory 2017-3456-01
Posted Dec 14, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-3456-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.0 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: A Denial of Service can be caused when a long request is sent to EAP 7.

tags | advisory, java, denial of service
systems | linux, redhat
advisories | CVE-2016-4978, CVE-2016-4993, CVE-2016-5406, CVE-2016-6311, CVE-2016-7046, CVE-2016-7061, CVE-2016-7066, CVE-2016-8627, CVE-2016-9589, CVE-2017-12165, CVE-2017-12167, CVE-2017-2595, CVE-2017-2666, CVE-2017-2670, CVE-2017-7525, CVE-2017-7536, CVE-2017-7559
SHA-256 | 28a3ebd18bae2ae54a432880cb23717b5cd055b67867d19ac18aa8f011ca235d

Red Hat Security Advisory 2017-3456-01

Change Mirror Download
X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.38]); Wed, 13 Dec 2017 17:32:55 +0000 (UTC)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update
Advisory ID: RHSA-2017:3456-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2017:3456
Issue date: 2017-12-13
CVE Names: CVE-2016-4978 CVE-2016-4993 CVE-2016-5406
CVE-2016-6311 CVE-2016-7046 CVE-2016-7061
CVE-2016-7066 CVE-2016-8627 CVE-2016-9589
CVE-2017-2595 CVE-2017-2666 CVE-2017-2670
CVE-2017-7525 CVE-2017-7536 CVE-2017-7559
CVE-2017-12165 CVE-2017-12167
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.

This release of Red Hat JBoss Enterprise Application Platform 7.1.0 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.0,
and includes bug fixes and enhancements, which are documented in the
Release Notes document linked to in the References.

Security Fix(es):

* A Denial of Service can be caused when a long request is sent to EAP 7.
(CVE-2016-7046)

* World executable permission on bin/jboss-cli after installation. Any
users of the system could cause harm, or shutdown the running instance.
(CVE-2016-7066)

* A deserialization vulnerability via readValue method of ObjectMapper
which allows arbitrary code execution. (CVE-2017-7525)

* JMSObjectMessage deserializes potentially malicious objects allowing
Remote Code Execution. (CVE-2016-4978)

* Undertow is vulnerable to the injection of arbitrary HTTP headers, and
also response splitting. (CVE-2016-4993)

* The domain controller will not propagate its administrative RBAC
configuration to some slaves leading to escalate their privileges.
(CVE-2016-5406)

* Internal IP address disclosed on redirect when request header Host field
is not set. (CVE-2016-6311)

* Potential EAP resource starvation DOS attack via GET requests for server
log files. (CVE-2016-8627)

* Inefficient Header Cache could cause denial of service. (CVE-2016-9589)

* The log file viewer allows arbitrary file read to authenticated user via
path traversal. (CVE-2017-2595)

* HTTP Request smuggling vulnerability due to permitting invalid characters
in HTTP requests. (CVE-2017-2666)

* Websocket non clean close can cause IO thread to get stuck in a loop.
(CVE-2017-2670)

* Privilege escalation with security manager's reflective permissions when
granted to Hibernate Validator. (CVE-2017-7536)

* Potential http request smuggling as Undertow parses the http headers with
unusual whitespaces. (CVE-2017-7559)

* Properties based files of the management and the application realm are
world readable allowing access to users and roles information to all the
users logged in to the system. (CVE-2017-12167)

* RBAC configuration allows users with a Monitor role to view the sensitive
information. (CVE-2016-7061)

* Improper whitespace parsing leading to potential HTTP request smuggling.
(CVE-2017-12165)

Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting
CVE-2017-7525; Calum Hutton (NCC Group) and Mikhail Egorov (Odin) for
reporting CVE-2016-4993; Luca Bueti for reporting CVE-2016-6311; Gabriel
Lavoie (Halogen Software) for reporting CVE-2016-9589; and Gregory
Ramsperger and Ryan Moak for reporting CVE-2017-2670. The CVE-2016-5406
issue was discovered by Tomaz Cerar (Red Hat); the CVE-2016-8627 issue was
discovered by Darran Lofthouse (Red Hat) and Brian Stansberry (Red Hat);
the CVE-2017-2666 issue was discovered by Radim Hatlapatka (Red Hat); the
CVE-2017-7536 issue was discovered by Gunnar Morling (Red Hat); the
CVE-2017-7559 and CVE-2017-12165 issues were discovered by Stuart Douglas
(Red Hat); and the CVE-2017-12167 issue was discovered by Brian Stansberry
(Red Hat) and Jeremy Choi (Red Hat). Upstream acknowledges WildFly as the
original reporter of CVE-2016-6311.

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1344321 - CVE-2016-4993 eap: HTTP header injection / response splitting
1359014 - CVE-2016-5406 EAP7 Privilege escalation when managing domain including earlier version slaves
1362735 - CVE-2016-6311 (EAP7) Internal IP address disclosed on redirect when request header Host field is not set
1376646 - CVE-2016-7046 undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS
1379207 - CVE-2016-4978 Apache ActiveMQ Artemis: Deserialization of untrusted input vulnerability
1380852 - CVE-2016-7061 EAP: Sensitive data can be exposed at the server level in domain mode
1388240 - CVE-2016-8627 Potential EAP resource starvation DOS attack via GET requests for server log files
1401661 - CVE-2016-7066 admin-cli: Any local users can connect to jboss-cli
1404782 - CVE-2016-9589 wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage
1413028 - CVE-2017-2595 wildfly: Arbitrary file read via path traversal
1436163 - CVE-2017-2666 undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests
1438885 - CVE-2017-2670 undertow: IO thread DoS via unclean Websocket closing
1462702 - CVE-2017-7525 jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
1465573 - CVE-2017-7536 hibernate-validator: Privilege escalation when running under the security manager
1481665 - CVE-2017-7559 undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666)
1490301 - CVE-2017-12165 undertow: improper whitespace parsing leading to potential HTTP request smuggling
1491612 - CVE-2017-12167 EAP-7: Wrong privileges on multiple property files

5. References:

https://access.redhat.com/security/cve/CVE-2016-4978
https://access.redhat.com/security/cve/CVE-2016-4993
https://access.redhat.com/security/cve/CVE-2016-5406
https://access.redhat.com/security/cve/CVE-2016-6311
https://access.redhat.com/security/cve/CVE-2016-7046
https://access.redhat.com/security/cve/CVE-2016-7061
https://access.redhat.com/security/cve/CVE-2016-7066
https://access.redhat.com/security/cve/CVE-2016-8627
https://access.redhat.com/security/cve/CVE-2016-9589
https://access.redhat.com/security/cve/CVE-2017-2595
https://access.redhat.com/security/cve/CVE-2017-2666
https://access.redhat.com/security/cve/CVE-2017-2670
https://access.redhat.com/security/cve/CVE-2017-7525
https://access.redhat.com/security/cve/CVE-2017-7536
https://access.redhat.com/security/cve/CVE-2017-7559
https://access.redhat.com/security/cve/CVE-2017-12165
https://access.redhat.com/security/cve/CVE-2017-12167
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=appplatform&version=7.1
https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/version-7.1
https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFaMWPGXlSAg2UNWIIRAomwAKCI67DxF4WBfKI7Rm6IOK5uJntzfACcDc3J
s2jEFLfYHlbqb8P0X4wXNLw=
=8ORk
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close