[RHSA-2010:0940-01] Important: JBoss Enterprise SOA Platform 4.2 and 4.3 security update

bugzilla at redhat.com bugzilla at redhat.com
Thu Dec 2 00:03:01 UTC 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: JBoss Enterprise SOA Platform 4.2 and 4.3 security update
Advisory ID:       RHSA-2010:0940-01
Product:           JBoss Enterprise Middleware
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2010-0940.html
Issue date:        2010-12-01
CVE Names:         CVE-2010-3708 
=====================================================================

1. Summary:

A patch for JBoss Enterprise SOA Platform 4.2 and 4.3 that fixes one
security issue is now available from the Red Hat Customer Portal.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

2. Description:

JBoss Enterprise SOA Platform is the next-generation ESB and business
process automation infrastructure. JBoss Enterprise SOA Platform allows IT
to leverage existing (MoM and EAI), modern (SOA and BPM-Rules), and future
(EDA and CEP) integration methodologies to dramatically improve business
process execution speed and quality.

An input sanitization flaw was found in the way JBoss Drools implemented
certain rule base serialization. If a remote attacker supplied
specially-crafted input to a JBoss Seam based application that accepts
serialized input, it could lead to arbitrary code execution with the
privileges of the JBoss server process. (CVE-2010-3708)

All users of JBoss Enterprise SOA Platform 4.2 and 4.3 as provided from the
Red Hat Customer Portal are advised to apply this patch. Refer to the
Solution section of this erratum for update instructions.

3. Solution:

A patch to correct CVE-2010-3708 for JBoss Enterprise SOA Platform 4.2 and
4.3 is available from the Red Hat Customer Portal. To download and apply
this patch:

1) Backup your existing JBoss Enterprise SOA Platform installation
(including its databases, applications, configuration files, and so on).

2) Log into the Customer Portal: https://access.redhat.com/login

3) Navigate to
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html

4) On the left-hand side menu, under "JBoss Enterprise Platforms" click
"SOA Platform". Then, using the "Version:" drop down menu, select the SOA
Platform version you are using, such as "4.2.0.GA_CP05" or "4.3.0.GA_CP04".

5) From either the "Security Advisories" links, click "SOA Standalone
4.3.0.GA_CP04 CVE-2010-3708 Patch" or "SOA Platform 4.3.0.GA_CP04
CVE-2010-3708 Patch" in the "Download File" column. The "Software Details"
page is displayed, where you can download the patch.

6) After downloading the patch, ensure you backed up your existing
installation as per step 1, and then follow the manual installation steps
on the "Software Details" page (where you downloaded the patch file from).
Note that it is recommended to halt the JBoss Enterprise SOA Platform
server by stopping the JBoss Application Server process before applying the
patch, and then after applying the patch, restart the JBoss Enterprise SOA
Platform server by starting the JBoss Application Server process.

4. Bugs fixed (http://bugzilla.redhat.com/):

633859 - CVE-2010-3708 JBoss drools deserialization remote code execution

5. References:

https://www.redhat.com/security/data/cve/CVE-2010-3708.html
http://www.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFM9uIoXlSAg2UNWIIRAsiZAJ0eu1wtgSgmyjVQ+UJd7tOxNzldUQCguZ6g
gIdwyUJvMR5T/EnVQuDEFz4=
=KNEO
-----END PGP SIGNATURE-----





More information about the Jboss-watch-list mailing list