rhsa-2013_0874
Vulnerability from csaf_redhat
Published
2013-05-28 17:35
Modified
2024-09-15 20:31
Summary
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 security update

Notes

Topic
Updated packages for JBoss Enterprise Web Platform 5.2.0 which fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
Details
The Enterprise Web Platform is a slimmed down profile of the JBoss Enterprise Application Platform intended for mid-size workloads with light and rich Java applications. XML encryption backwards compatibility attacks were found against various frameworks, including Apache CXF. An attacker could force a server to use insecure, legacy cryptosystems, even when secure cryptosystems were enabled on endpoints. By forcing the use of legacy cryptosystems, flaws such as CVE-2011-1096 and CVE-2011-2487 would be exposed, allowing plain text to be recovered from cryptograms and symmetric keys. This issue affected both the JBoss Web Services CXF (jbossws-cxf) and JBoss Web Services Native (jbossws-native) stacks. (CVE-2012-5575) Red Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj Somorovsky of Ruhr-University Bochum for reporting this issue. If you are using jbossws-cxf, then automatic checks to prevent this flaw are only run when WS-SecurityPolicy is used to enforce security requirements. It is best practice to use WS-SecurityPolicy to enforce security requirements. If you are using jbossws-native, the fix for this flaw is implemented by two new configuration parameters in the 'encryption' element. This element can be a child of 'requires' in both client and server wsse configuration descriptors (set on a per-application basis via the application's jboss-wsse-server.xml and jboss-wsse-client.xml files). The new attributes are 'algorithms' and 'keyWrapAlgorithms'. These attributes should contain a blank space or comma separated list of algorithm IDs that are allowed for the encrypted incoming message, both for encryption and private key wrapping. For backwards compatibility, no algorithm checks are performed by default for empty lists or missing attributes. For example (do not include the line break in your configuration): encryption algorithms="aes-192-gcm aes-256-gcm" keyWrapAlgorithms="rsa_oaep" Specifies that incoming messages are required to be encrypted, and that the only permitted encryption algorithms are AES-192 and 256 in GCM mode, and RSA-OAEP only for key wrapping. Before performing any decryption, the jbossws-native stack will verify that each algorithm specified in the incoming messages is included in the allowed algorithms lists from these new encryption element attributes. The algorithm values to be used for 'algorithms' and 'keyWrapAlgorithms' are the same as for 'algorithm' and 'keyWrapAlgorithm' in the 'encrypt' element. Warning: Before applying this update, back up your existing JBoss Enterprise Web Platform installation (including all applications and configuration files). All users of JBoss Enterprise Web Platform 5.2.0 on Red Hat Enterprise Linux 4, 5, and 6 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated packages for JBoss Enterprise Web Platform 5.2.0 which fix one\nsecurity issue are now available for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The Enterprise Web Platform is a slimmed down profile of the JBoss\nEnterprise Application Platform intended for mid-size workloads with light\nand rich Java applications.\n\nXML encryption backwards compatibility attacks were found against various\nframeworks, including Apache CXF. An attacker could force a server to use\ninsecure, legacy cryptosystems, even when secure cryptosystems were enabled\non endpoints. By forcing the use of legacy cryptosystems, flaws such as\nCVE-2011-1096 and CVE-2011-2487 would be exposed, allowing plain text to be\nrecovered from cryptograms and symmetric keys. This issue affected both the\nJBoss Web Services CXF (jbossws-cxf) and JBoss Web Services Native\n(jbossws-native) stacks. (CVE-2012-5575)\n\nRed Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting this issue.\n\nIf you are using jbossws-cxf, then automatic checks to prevent this flaw\nare only run when WS-SecurityPolicy is used to enforce security\nrequirements. It is best practice to use WS-SecurityPolicy to enforce\nsecurity requirements.\n\nIf you are using jbossws-native, the fix for this flaw is implemented by\ntwo new configuration parameters in the \u0027encryption\u0027 element. This element\ncan be a child of \u0027requires\u0027 in both client and server wsse configuration\ndescriptors (set on a per-application basis via the application\u0027s\njboss-wsse-server.xml and jboss-wsse-client.xml files). The new attributes\nare \u0027algorithms\u0027 and \u0027keyWrapAlgorithms\u0027. These attributes should contain a\nblank space or comma separated list of algorithm IDs that are allowed for\nthe encrypted incoming message, both for encryption and private key\nwrapping. For backwards compatibility, no algorithm checks are performed by\ndefault for empty lists or missing attributes.\n\nFor example (do not include the line break in your configuration):\n\nencryption algorithms=\"aes-192-gcm aes-256-gcm\"\nkeyWrapAlgorithms=\"rsa_oaep\"\n\nSpecifies that incoming messages are required to be encrypted, and that the\nonly permitted encryption algorithms are AES-192 and 256 in GCM mode, and\nRSA-OAEP only for key wrapping.\n\nBefore performing any decryption, the jbossws-native stack will verify that\neach algorithm specified in the incoming messages is included in the\nallowed algorithms lists from these new encryption element attributes. The\nalgorithm values to be used for \u0027algorithms\u0027 and \u0027keyWrapAlgorithms\u0027 are\nthe same as for \u0027algorithm\u0027 and \u0027keyWrapAlgorithm\u0027 in the \u0027encrypt\u0027\nelement.\n\nWarning: Before applying this update, back up your existing JBoss\nEnterprise Web Platform installation (including all applications and\nconfiguration files).\n\nAll users of JBoss Enterprise Web Platform 5.2.0 on Red Hat Enterprise\nLinux 4, 5, and 6 are advised to upgrade to these updated packages. The\nJBoss server process must be restarted for the update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2013:0874",
        "url": "https://access.redhat.com/errata/RHSA-2013:0874"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://ws.apache.org/wss4j/best_practice.html",
        "url": "http://ws.apache.org/wss4j/best_practice.html"
      },
      {
        "category": "external",
        "summary": "http://cxf.apache.org/cve-2012-5575.html",
        "url": "http://cxf.apache.org/cve-2012-5575.html"
      },
      {
        "category": "external",
        "summary": "880443",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2013/rhsa-2013_0874.json"
      }
    ],
    "title": "Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 security update",
    "tracking": {
      "current_release_date": "2024-09-15T20:31:07+00:00",
      "generator": {
        "date": "2024-09-15T20:31:07+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "3.33.3"
        }
      },
      "id": "RHSA-2013:0874",
      "initial_release_date": "2013-05-28T17:35:00+00:00",
      "revision_history": [
        {
          "date": "2013-05-28T17:35:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2013-05-28T17:39:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-09-15T20:31:07+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Platform 5 for RHEL 4 AS",
                "product": {
                  "name": "Red Hat JBoss Web Platform 5 for RHEL 4 AS",
                  "product_id": "4AS-JBEWP-5",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Platform 5 for RHEL 4 ES",
                "product": {
                  "name": "Red Hat JBoss Web Platform 5 for RHEL 4 ES",
                  "product_id": "4ES-JBEWP-5",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Platform 5 for RHEL 5 Server",
                "product": {
                  "name": "Red Hat JBoss Web Platform 5 for RHEL 5 Server",
                  "product_id": "5Server-JBEWP-5",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Platform 5 for RHEL 6 Server",
                "product": {
                  "name": "Red Hat JBoss Web Platform 5 for RHEL 6 Server",
                  "product_id": "6Server-JBEWP-5",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Platform"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wss4j-0:1.5.12-6_patch_03.ep5.el4.src",
                "product": {
                  "name": "wss4j-0:1.5.12-6_patch_03.ep5.el4.src",
                  "product_id": "wss4j-0:1.5.12-6_patch_03.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wss4j@1.5.12-6_patch_03.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src",
                "product": {
                  "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src",
                  "product_id": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbossws@3.1.2-14.SP15_patch_02.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src",
                "product": {
                  "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src",
                  "product_id": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/apache-cxf@2.2.12-12.patch_07.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wss4j-0:1.5.12-6_patch_03.ep5.el5.src",
                "product": {
                  "name": "wss4j-0:1.5.12-6_patch_03.ep5.el5.src",
                  "product_id": "wss4j-0:1.5.12-6_patch_03.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wss4j@1.5.12-6_patch_03.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.src",
                "product": {
                  "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.src",
                  "product_id": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbossws@3.1.2-14.SP15_patch_02.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el5.src",
                "product": {
                  "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el5.src",
                  "product_id": "apache-cxf-0:2.2.12-12.patch_07.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/apache-cxf@2.2.12-12.patch_07.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wss4j-0:1.5.12-6_patch_03.ep5.el6.src",
                "product": {
                  "name": "wss4j-0:1.5.12-6_patch_03.ep5.el6.src",
                  "product_id": "wss4j-0:1.5.12-6_patch_03.ep5.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wss4j@1.5.12-6_patch_03.ep5.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.src",
                "product": {
                  "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.src",
                  "product_id": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbossws@3.1.2-14.SP15_patch_02.ep5.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el6.src",
                "product": {
                  "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el6.src",
                  "product_id": "apache-cxf-0:2.2.12-12.patch_07.ep5.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/apache-cxf@2.2.12-12.patch_07.ep5.el6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch",
                "product": {
                  "name": "wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch",
                  "product_id": "wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wss4j@1.5.12-6_patch_03.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch",
                "product": {
                  "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch",
                  "product_id": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbossws@3.1.2-14.SP15_patch_02.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch",
                "product": {
                  "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch",
                  "product_id": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/apache-cxf@2.2.12-12.patch_07.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wss4j-0:1.5.12-6_patch_03.ep5.el5.noarch",
                "product": {
                  "name": "wss4j-0:1.5.12-6_patch_03.ep5.el5.noarch",
                  "product_id": "wss4j-0:1.5.12-6_patch_03.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wss4j@1.5.12-6_patch_03.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.noarch",
                "product": {
                  "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.noarch",
                  "product_id": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbossws@3.1.2-14.SP15_patch_02.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el5.noarch",
                "product": {
                  "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el5.noarch",
                  "product_id": "apache-cxf-0:2.2.12-12.patch_07.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/apache-cxf@2.2.12-12.patch_07.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wss4j-0:1.5.12-6_patch_03.ep5.el6.noarch",
                "product": {
                  "name": "wss4j-0:1.5.12-6_patch_03.ep5.el6.noarch",
                  "product_id": "wss4j-0:1.5.12-6_patch_03.ep5.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wss4j@1.5.12-6_patch_03.ep5.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.noarch",
                "product": {
                  "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.noarch",
                  "product_id": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbossws@3.1.2-14.SP15_patch_02.ep5.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el6.noarch",
                "product": {
                  "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el6.noarch",
                  "product_id": "apache-cxf-0:2.2.12-12.patch_07.ep5.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/apache-cxf@2.2.12-12.patch_07.ep5.el6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS",
          "product_id": "4AS-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch"
        },
        "product_reference": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS",
          "product_id": "4AS-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src"
        },
        "product_reference": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS",
          "product_id": "4AS-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch"
        },
        "product_reference": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS",
          "product_id": "4AS-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src"
        },
        "product_reference": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS",
          "product_id": "4AS-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch"
        },
        "product_reference": "wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wss4j-0:1.5.12-6_patch_03.ep5.el4.src as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS",
          "product_id": "4AS-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el4.src"
        },
        "product_reference": "wss4j-0:1.5.12-6_patch_03.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES",
          "product_id": "4ES-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch"
        },
        "product_reference": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES",
          "product_id": "4ES-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src"
        },
        "product_reference": "apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES",
          "product_id": "4ES-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch"
        },
        "product_reference": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES",
          "product_id": "4ES-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src"
        },
        "product_reference": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES",
          "product_id": "4ES-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch"
        },
        "product_reference": "wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wss4j-0:1.5.12-6_patch_03.ep5.el4.src as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES",
          "product_id": "4ES-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el4.src"
        },
        "product_reference": "wss4j-0:1.5.12-6_patch_03.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server",
          "product_id": "5Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el5.noarch"
        },
        "product_reference": "apache-cxf-0:2.2.12-12.patch_07.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el5.src as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server",
          "product_id": "5Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el5.src"
        },
        "product_reference": "apache-cxf-0:2.2.12-12.patch_07.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server",
          "product_id": "5Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.noarch"
        },
        "product_reference": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.src as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server",
          "product_id": "5Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.src"
        },
        "product_reference": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wss4j-0:1.5.12-6_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server",
          "product_id": "5Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el5.noarch"
        },
        "product_reference": "wss4j-0:1.5.12-6_patch_03.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wss4j-0:1.5.12-6_patch_03.ep5.el5.src as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server",
          "product_id": "5Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el5.src"
        },
        "product_reference": "wss4j-0:1.5.12-6_patch_03.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el6.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 6 Server",
          "product_id": "6Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el6.noarch"
        },
        "product_reference": "apache-cxf-0:2.2.12-12.patch_07.ep5.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache-cxf-0:2.2.12-12.patch_07.ep5.el6.src as a component of Red Hat JBoss Web Platform 5 for RHEL 6 Server",
          "product_id": "6Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el6.src"
        },
        "product_reference": "apache-cxf-0:2.2.12-12.patch_07.ep5.el6.src",
        "relates_to_product_reference": "6Server-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 6 Server",
          "product_id": "6Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.noarch"
        },
        "product_reference": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.src as a component of Red Hat JBoss Web Platform 5 for RHEL 6 Server",
          "product_id": "6Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.src"
        },
        "product_reference": "jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.src",
        "relates_to_product_reference": "6Server-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wss4j-0:1.5.12-6_patch_03.ep5.el6.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 6 Server",
          "product_id": "6Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el6.noarch"
        },
        "product_reference": "wss4j-0:1.5.12-6_patch_03.ep5.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWP-5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wss4j-0:1.5.12-6_patch_03.ep5.el6.src as a component of Red Hat JBoss Web Platform 5 for RHEL 6 Server",
          "product_id": "6Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el6.src"
        },
        "product_reference": "wss4j-0:1.5.12-6_patch_03.ep5.el6.src",
        "relates_to_product_reference": "6Server-JBEWP-5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Tibor Jager",
            "Kenneth G. Paterson",
            "Juraj Somorovsky"
          ],
          "organization": "Ruhr-University Bochum"
        }
      ],
      "cve": "CVE-2012-5575",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2012-11-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "4AS-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch",
            "4AS-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src",
            "4AS-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch",
            "4AS-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src",
            "4AS-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch",
            "4AS-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el4.src",
            "4ES-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch",
            "4ES-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src",
            "4ES-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch",
            "4ES-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src",
            "4ES-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch",
            "4ES-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el4.src"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "880443"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka \"XML Encryption backwards compatibility attack.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "apache-cxf: XML encryption backwards compatibility attacks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el5.noarch",
          "5Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el5.src",
          "5Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.noarch",
          "5Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.src",
          "5Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el5.noarch",
          "5Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el5.src",
          "6Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el6.noarch",
          "6Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el6.src",
          "6Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.noarch",
          "6Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.src",
          "6Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el6.noarch",
          "6Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el6.src"
        ],
        "known_not_affected": [
          "4AS-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch",
          "4AS-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src",
          "4AS-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch",
          "4AS-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src",
          "4AS-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch",
          "4AS-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el4.src",
          "4ES-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el4.noarch",
          "4ES-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el4.src",
          "4ES-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.noarch",
          "4ES-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el4.src",
          "4ES-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el4.noarch",
          "4ES-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el4.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-5575"
        },
        {
          "category": "external",
          "summary": "RHBZ#880443",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5575",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-5575"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5575",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5575"
        },
        {
          "category": "external",
          "summary": "http://cxf.apache.org/cve-2012-5575.html",
          "url": "http://cxf.apache.org/cve-2012-5575.html"
        },
        {
          "category": "external",
          "summary": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/",
          "url": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/"
        }
      ],
      "release_date": "2013-03-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
          "product_ids": [
            "5Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el5.noarch",
            "5Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el5.src",
            "5Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.noarch",
            "5Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.src",
            "5Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el5.noarch",
            "5Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el5.src",
            "6Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el6.noarch",
            "6Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el6.src",
            "6Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.noarch",
            "6Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.src",
            "6Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el6.noarch",
            "6Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el6.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2013:0874"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el5.noarch",
            "5Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el5.src",
            "5Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.noarch",
            "5Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el5.src",
            "5Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el5.noarch",
            "5Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el5.src",
            "6Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el6.noarch",
            "6Server-JBEWP-5:apache-cxf-0:2.2.12-12.patch_07.ep5.el6.src",
            "6Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.noarch",
            "6Server-JBEWP-5:jbossws-0:3.1.2-14.SP15_patch_02.ep5.el6.src",
            "6Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el6.noarch",
            "6Server-JBEWP-5:wss4j-0:1.5.12-6_patch_03.ep5.el6.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "apache-cxf: XML encryption backwards compatibility attacks"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...