-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss BPM Suite 6.0.2 update Advisory ID: RHSA-2014:0819-01 Product: Red Hat JBoss BPM Suite Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0819.html Issue date: 2014-06-30 CVE Names: CVE-2014-0107 CVE-2014-0363 CVE-2014-0364 ===================================================================== 1. Summary: Red Hat JBoss BPM Suite 6.0.2, which fixes multiple security issues, various bugs, and adds enhancements, is now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Description: Red Hat JBoss BPM Suite is a business rules and processes management system for the management, storage, creation, modification, and deployment of JBoss rules and BPMN2-compliant business processes. This release of Red Hat JBoss BPM Suite 6.0.2 serves as a replacement for Red Hat JBoss BPM Suite 6.0.1, and includes bug fixes and enhancements. Refer to the Red Hat JBoss BPM Suite 6.0.2 Release Notes for information on the most significant of these changes. The Release Notes will be available shortly at https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_BPM_Suite/ The following security issues are fixed with this release: It was found that the secure processing feature of Xalan-Java had insufficient restrictions defined for certain properties and features. A remote attacker able to provide Extensible Stylesheet Language Transformations (XSLT) content to be processed by an application using Xalan-Java could use this flaw to bypass the intended constraints of the secure processing feature. Depending on the components available in the classpath, this could lead to arbitrary remote code execution in the context of the application server running the application that uses Xalan-Java. (CVE-2014-0107) It was found that the ServerTrustManager in the Smack XMPP API did not verify basicConstraints and nameConstraints in X.509 certificate chains. A man-in-the-middle attacker could use this flaw to spoof servers and obtain sensitive information. (CVE-2014-0363) It was found that the ParseRoster component in the Smack XMPP API did not verify the From attribute of a roster-query IQ stanza. A remote attacker could use this flaw to spoof IQ responses. (CVE-2014-0364) All users of Red Hat JBoss BPM Suite 6.0.1 as provided from the Red Hat Customer Portal are advised to upgrade to Red Hat JBoss BPM Suite 6.0.2. 3. Solution: The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. It is recommended to halt the server by stopping the JBoss Application Server process before installing this update, and then after installing the update, restart the server by starting the JBoss Application Server process. 4. Bugs fixed (https://bugzilla.redhat.com/): 1080248 - CVE-2014-0107 Xalan-Java: insufficient constraints in secure processing feature 1093273 - CVE-2014-0363 smack: incorrect X.509 certificate validation 1093276 - CVE-2014-0364 smack: IQ response spoofing 5. References: https://www.redhat.com/security/data/cve/CVE-2014-0107.html https://www.redhat.com/security/data/cve/CVE-2014-0363.html https://www.redhat.com/security/data/cve/CVE-2014-0364.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite&downloadType=distributions&version=6.0.2 https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_BPM_Suite/ 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTsdEPXlSAg2UNWIIRAvu/AJ9C0hY1754u7KoZ03V58FsJRlQDTwCgl0j2 UmrOhtSbWfvLWRBLgK2+Mkc= =Lnv7 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce