Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-2071 (GCVE-0-2013-2071)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:27:40.654Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1471372"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=54178"
},
{
"name": "FEDORA-2013-7999",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "FEDORA-2013-7979",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html"
},
{
"name": "20130510 CVE-2013-2071 Request mix-up if AsyncListener method throws RuntimeException",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html"
},
{
"name": "USN-1841-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1841-1"
},
{
"name": "59798",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/59798"
},
{
"name": "64758",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/64758"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "openSUSE-SU-2013:1306",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html"
},
{
"name": "FEDORA-2013-7993",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html"
},
{
"name": "HPSBMU02966",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=139344248911289\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-05-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-05-22T09:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1471372"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=54178"
},
{
"name": "FEDORA-2013-7999",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "FEDORA-2013-7979",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html"
},
{
"name": "20130510 CVE-2013-2071 Request mix-up if AsyncListener method throws RuntimeException",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html"
},
{
"name": "USN-1841-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1841-1"
},
{
"name": "59798",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/59798"
},
{
"name": "64758",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/64758"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "openSUSE-SU-2013:1306",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html"
},
{
"name": "FEDORA-2013-7993",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html"
},
{
"name": "HPSBMU02966",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=139344248911289\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2071",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1471372",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1471372"
},
{
"name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372"
},
{
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=54178",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=54178"
},
{
"name": "FEDORA-2013-7999",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "FEDORA-2013-7979",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html"
},
{
"name": "20130510 CVE-2013-2071 Request mix-up if AsyncListener method throws RuntimeException",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html"
},
{
"name": "USN-1841-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1841-1"
},
{
"name": "59798",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59798"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "openSUSE-SU-2013:1306",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html"
},
{
"name": "FEDORA-2013-7993",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html"
},
{
"name": "HPSBMU02966",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=139344248911289\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-2071",
"datePublished": "2013-06-01T10:00:00",
"dateReserved": "2013-02-19T00:00:00",
"dateUpdated": "2024-08-06T15:27:40.654Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2013-2071\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-06-01T14:21:05.890\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.\"},{\"lang\":\"es\",\"value\":\"java/org/apache/catalina/core/AsyncContextImpl.java en Apache Tomcat v7.x anteriores a v7.0.40 no gestionan de forma adecuada el lanzamiento de RuntimeException en AsyncListener en application, lo que permite a atacantes dependiendo del contexto obtener una petici\u00f3n de informaci\u00f3n sensible solicitada en circunstancias adecuadas por otras aplicaciones que registran, las peticiones que se procesar\u00e1n.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:N/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F8C62EF-1B67-456A-9C66-755439CF8556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E9607B-4D28-460D-896B-E4B7FA22441E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A819E245-D641-4F19-9139-6C940504F6E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C381275-10C5-4939-BCE3-0D1F3B3CB2EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"81A31CA0-A209-4C49-AA06-C38E165E5B68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7205475A-6D04-4042-B24E-1DA5A57029B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08022987-B36B-4F63-88A5-A8F59195DF4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AA563BF-A67A-477D-956A-167ABEF885C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF4B7557-EF35-451E-B55D-3296966695AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8980E61E-27BE-4858-82B3-C0E8128AF521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8756BF9B-3E24-4677-87AE-31CE776541F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88CE057E-2092-4C98-8D0C-75CF439D0A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F194580-EE6D-4E38-87F3-F0661262256B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9731BAA-4C6C-4259-B786-F577D8A90FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F74A421-D019-4248-84B8-C70D4D9A8A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BA27FF9-4C66-4E17-95C0-1CB2DAA6AFC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05346F5A-FB52-4376-AAC7-9A5308216545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"305688F2-50A6-41FB-8614-BC589DB9A789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D24AA431-C436-4AA5-85DF-B9AAFF2548FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25966344-15D5-4101-9346-B06BFD2DFFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F4CBAC-27B1-4EFF-955A-A63B457D0578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD55B338-9DBE-4643-ABED-A08964D3AF7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D4F710E-06EA-48F4-AC6A-6F143950F015\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4936C2-0B2D-4C44-98C3-443090965F5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48453405-2319-4327-9F4C-6F70B49452C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DD9544-6424-41A6-AEC0-EC19B8A10E71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4670E65-2E11-49A4-B661-57C2F60D411F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31002A23-4788-4BC7-AE11-A3C2AA31716D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D731065-626B-4425-8E49-F708DD457824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E037DA05-2BEF-4F64-B8BB-307247B6A05C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D395D95B-1F4A-420E-A0F6-609360AF7B69\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=139344248911289\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1471372\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://tomcat.apache.org/security-7.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/59798\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/64758\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1841-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.apache.org/bugzilla/show_bug.cgi?id=54178\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=139344248911289\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1471372\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://tomcat.apache.org/security-7.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/59798\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/64758\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1841-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.apache.org/bugzilla/show_bug.cgi?id=54178\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}]}}"
}
}
fkie_cve-2013-2071
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=139344248911289&w=2 | ||
| secalert@redhat.com | http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372&r2=1471371&pathrev=1471372 | Patch | |
| secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=1471372 | Patch | |
| secalert@redhat.com | http://tomcat.apache.org/security-7.html | Vendor Advisory | |
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/59798 | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/64758 | ||
| secalert@redhat.com | http://www.ubuntu.com/usn/USN-1841-1 | ||
| secalert@redhat.com | https://issues.apache.org/bugzilla/show_bug.cgi?id=54178 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=139344248911289&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372&r2=1471371&pathrev=1471372 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=1471372 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://tomcat.apache.org/security-7.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/59798 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/64758 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1841-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/bugzilla/show_bug.cgi?id=54178 | Exploit |
| Vendor | Product | Version | |
|---|---|---|---|
| apache | tomcat | 7.0.0 | |
| apache | tomcat | 7.0.0 | |
| apache | tomcat | 7.0.1 | |
| apache | tomcat | 7.0.2 | |
| apache | tomcat | 7.0.2 | |
| apache | tomcat | 7.0.3 | |
| apache | tomcat | 7.0.4 | |
| apache | tomcat | 7.0.4 | |
| apache | tomcat | 7.0.5 | |
| apache | tomcat | 7.0.6 | |
| apache | tomcat | 7.0.7 | |
| apache | tomcat | 7.0.8 | |
| apache | tomcat | 7.0.9 | |
| apache | tomcat | 7.0.10 | |
| apache | tomcat | 7.0.11 | |
| apache | tomcat | 7.0.12 | |
| apache | tomcat | 7.0.13 | |
| apache | tomcat | 7.0.14 | |
| apache | tomcat | 7.0.15 | |
| apache | tomcat | 7.0.16 | |
| apache | tomcat | 7.0.17 | |
| apache | tomcat | 7.0.18 | |
| apache | tomcat | 7.0.19 | |
| apache | tomcat | 7.0.20 | |
| apache | tomcat | 7.0.21 | |
| apache | tomcat | 7.0.22 | |
| apache | tomcat | 7.0.23 | |
| apache | tomcat | 7.0.25 | |
| apache | tomcat | 7.0.28 | |
| apache | tomcat | 7.0.30 | |
| apache | tomcat | 7.0.32 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F8C62EF-1B67-456A-9C66-755439CF8556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "33E9607B-4D28-460D-896B-E4B7FA22441E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A819E245-D641-4F19-9139-6C940504F6E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8C381275-10C5-4939-BCE3-0D1F3B3CB2EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "81A31CA0-A209-4C49-AA06-C38E165E5B68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7205475A-6D04-4042-B24E-1DA5A57029B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "08022987-B36B-4F63-88A5-A8F59195DF4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*",
"matchCriteriaId": "0AA563BF-A67A-477D-956A-167ABEF885C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FF4B7557-EF35-451E-B55D-3296966695AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8980E61E-27BE-4858-82B3-C0E8128AF521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8756BF9B-3E24-4677-87AE-31CE776541F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "88CE057E-2092-4C98-8D0C-75CF439D0A9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8F194580-EE6D-4E38-87F3-F0661262256B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A9731BAA-4C6C-4259-B786-F577D8A90FA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1F74A421-D019-4248-84B8-C70D4D9A8A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "2BA27FF9-4C66-4E17-95C0-1CB2DAA6AFC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "05346F5A-FB52-4376-AAC7-9A5308216545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "305688F2-50A6-41FB-8614-BC589DB9A789",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "D24AA431-C436-4AA5-85DF-B9AAFF2548FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "25966344-15D5-4101-9346-B06BFD2DFFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "11F4CBAC-27B1-4EFF-955A-A63B457D0578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "FD55B338-9DBE-4643-ABED-A08964D3AF7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "0D4F710E-06EA-48F4-AC6A-6F143950F015",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "2C4936C2-0B2D-4C44-98C3-443090965F5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "48453405-2319-4327-9F4C-6F70B49452C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "49DD9544-6424-41A6-AEC0-EC19B8A10E71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "E4670E65-2E11-49A4-B661-57C2F60D411F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "31002A23-4788-4BC7-AE11-A3C2AA31716D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "7D731065-626B-4425-8E49-F708DD457824",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "E037DA05-2BEF-4F64-B8BB-307247B6A05C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "D395D95B-1F4A-420E-A0F6-609360AF7B69",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes."
},
{
"lang": "es",
"value": "java/org/apache/catalina/core/AsyncContextImpl.java en Apache Tomcat v7.x anteriores a v7.0.40 no gestionan de forma adecuada el lanzamiento de RuntimeException en AsyncListener en application, lo que permite a atacantes dependiendo del contexto obtener una petici\u00f3n de informaci\u00f3n sensible solicitada en circunstancias adecuadas por otras aplicaciones que registran, las peticiones que se procesar\u00e1n."
}
],
"id": "CVE-2013-2071",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-06-01T14:21:05.890",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=139344248911289\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1471372"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/59798"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-1841-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=54178"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=139344248911289\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1471372"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/59798"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1841-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=54178"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
rhsa-2013_1012
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and\nseveral bugs, is now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.0,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1\nRelease Notes for information on the most significant of these changes,\navailable shortly from https://access.redhat.com/site/documentation/\n\nThe following security issues are also fixed with this release:\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_proxy_balancer module\u0027s manager web interface. If a remote attacker\ncould trick a user, who was logged into the manager web interface, into\nvisiting a specially-crafted URL, it would lead to arbitrary web script\nexecution in the context of the user\u0027s manager interface session.\n(CVE-2012-4558)\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An\nattacker could possibly use these flaws to perform XSS attacks if they were\nable to make the victim\u0027s browser generate an HTTP request with a\nspecially-crafted Host header. (CVE-2012-3499)\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\nDuring a narrow window of time, if a remote attacker sent requests while a\nuser was logging in, it could possibly result in the attacker\u0027s requests\nbeing processed as if they were sent by the user. (CVE-2013-2067)\n\nA denial of service flaw was found in the way the Tomcat chunked transfer\nencoding input filter processed CRLF sequences. A remote attacker could\nuse this flaw to send an excessively long request, consuming network\nbandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding\nis enabled by default. (CVE-2012-3544)\n\nA flaw was found in the way the Tomcat 7 asynchronous context\nimplementation performed request management in certain circumstances. If an\napplication used AsyncListeners and threw RuntimeExceptions, Tomcat could\nsend a reply that contains information from a different user\u0027s request,\npossibly leading to the disclosure of sensitive information. This issue\nonly affected Tomcat 7. (CVE-2013-2071)\n\nNote: Do not install Red Hat JBoss Web Server 2 on a host which has Red Hat\nJBoss Web Server 1 installed.\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of Red Hat JBoss Web Server 2.0.0 on Red Hat Enterprise Linux 6\nare advised to upgrade to Red Hat JBoss Web Server 2.0.1. The JBoss server\nprocess must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1012",
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/",
"url": "https://access.redhat.com/site/documentation/"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html"
},
{
"category": "external",
"summary": "915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1012.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update",
"tracking": {
"current_release_date": "2024-11-25T11:55:11+00:00",
"generator": {
"date": "2024-11-25T11:55:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2013:1012",
"initial_release_date": "2013-07-03T15:43:00+00:00",
"revision_history": [
{
"date": "2013-07-03T15:43:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-07-03T15:47:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T11:55:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"product": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"product": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"product": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"product": {
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"product_id": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk@1.2.37-2.redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el6.src",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el6.src",
"product_id": "httpd-0:2.2.22-23.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"product": {
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"product_id": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.40-5_patch_01.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"product": {
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"product_id": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.37-10_patch_01.ep6.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"product": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product_id": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-tomcat-eap6@1.6-6.redhat_4.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"product": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_id": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_id": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-demo@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_id": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-el-1.0-api@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-lib@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product_id": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6-debuginfo@1.0.15-1.redhat_1.ep6.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product": {
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product_id": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.27-4.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product_id": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.4-1.Final.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_id": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.37-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-devel-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-devel-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-tools-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-tools-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.22-23.ep6.el6.i386",
"product": {
"name": "mod_ssl-1:2.2.22-23.ep6.el6.i386",
"product_id": "mod_ssl-1:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-manual-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-manual-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.22-23.ep6.el6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product_id": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6-debuginfo@1.0.15-1.redhat_1.ep6.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product": {
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product_id": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.27-4.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product_id": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.4-1.Final.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_id": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.37-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"product_id": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.22-23.ep6.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch"
},
"product_reference": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch"
},
"product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src"
},
"product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch"
},
"product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src"
},
"product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-devel-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-manual-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-tools-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src"
},
"product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src"
},
"product_reference": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386"
},
"product_reference": "mod_ssl-1:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386"
},
"product_reference": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64"
},
"product_reference": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src"
},
"product_reference": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src"
},
"product_reference": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-3499",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915883"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple XSS flaws due to unescaped hostnames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3499"
},
{
"category": "external",
"summary": "RHBZ#915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: multiple XSS flaws due to unescaped hostnames"
},
{
"cve": "CVE-2012-3544",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961783"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Limited DoS in chunked transfer encoding input filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3544"
},
{
"category": "external",
"summary": "RHBZ#961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Limited DoS in chunked transfer encoding input filter"
},
{
"cve": "CVE-2012-4558",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915884"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: XSS flaw in mod_proxy_balancer manager interface",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4558"
},
{
"category": "external",
"summary": "RHBZ#915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: XSS flaw in mod_proxy_balancer manager interface"
},
{
"cve": "CVE-2013-2067",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961779"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Session fixation in form authenticator",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2067"
},
{
"category": "external",
"summary": "RHBZ#961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Session fixation in form authenticator"
},
{
"cve": "CVE-2013-2071",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961803"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2071"
},
{
"category": "external",
"summary": "RHBZ#961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2071",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions"
}
]
}
RHSA-2013:1011
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and\nseveral bugs, is now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.0,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1\nRelease Notes for information on the most significant of these changes,\navailable shortly from https://access.redhat.com/site/documentation/\n\nThe following security issues are also fixed with this release:\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_proxy_balancer module\u0027s manager web interface. If a remote attacker\ncould trick a user, who was logged into the manager web interface, into\nvisiting a specially-crafted URL, it would lead to arbitrary web script\nexecution in the context of the user\u0027s manager interface session.\n(CVE-2012-4558)\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An\nattacker could possibly use these flaws to perform XSS attacks if they were\nable to make the victim\u0027s browser generate an HTTP request with a\nspecially-crafted Host header. (CVE-2012-3499)\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\nDuring a narrow window of time, if a remote attacker sent requests while a\nuser was logging in, it could possibly result in the attacker\u0027s requests\nbeing processed as if they were sent by the user. (CVE-2013-2067)\n\nA denial of service flaw was found in the way the Tomcat chunked transfer\nencoding input filter processed CRLF sequences. A remote attacker could\nuse this flaw to send an excessively long request, consuming network\nbandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding\nis enabled by default. (CVE-2012-3544)\n\nA flaw was found in the way the Tomcat 7 asynchronous context\nimplementation performed request management in certain circumstances. If an\napplication used AsyncListeners and threw RuntimeExceptions, Tomcat could\nsend a reply that contains information from a different user\u0027s request,\npossibly leading to the disclosure of sensitive information. This issue\nonly affected Tomcat 7. (CVE-2013-2071)\n\nNote: Do not install Red Hat JBoss Web Server 2 on a host which has Red Hat\nJBoss Web Server 1 installed.\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of Red Hat JBoss Web Server 2.0.0 on Red Hat Enterprise Linux 5\nare advised to upgrade to Red Hat JBoss Web Server 2.0.1. The JBoss server\nprocess must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1011",
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/",
"url": "https://access.redhat.com/site/documentation/"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html"
},
{
"category": "external",
"summary": "915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1011.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update",
"tracking": {
"current_release_date": "2025-10-09T14:18:14+00:00",
"generator": {
"date": "2025-10-09T14:18:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2013:1011",
"initial_release_date": "2013-07-03T15:38:00+00:00",
"revision_history": [
{
"date": "2013-07-03T15:38:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-07-03T15:47:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T14:18:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el5.x86_64",
"product_id": "httpd-0:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"product_id": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"product_id": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"product_id": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"product_id": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el5.i386",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el5.i386",
"product_id": "httpd-0:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.22-23.ep6.el5.i386",
"product": {
"name": "httpd-devel-0:2.2.22-23.ep6.el5.i386",
"product_id": "httpd-devel-0:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.22-23.ep6.el5.i386",
"product": {
"name": "httpd-tools-0:2.2.22-23.ep6.el5.i386",
"product_id": "httpd-tools-0:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.22-23.ep6.el5.i386",
"product": {
"name": "mod_ssl-1:2.2.22-23.ep6.el5.i386",
"product_id": "mod_ssl-1:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.22-23.ep6.el5.i386",
"product": {
"name": "httpd-manual-0:2.2.22-23.ep6.el5.i386",
"product_id": "httpd-manual-0:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"product": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"product": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"product": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"product": {
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"product_id": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk@1.2.37-2.redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el5.src",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el5.src",
"product_id": "httpd-0:2.2.22-23.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"product": {
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"product_id": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.37-8_patch_01.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"product": {
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"product_id": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.40-9_patch_01.ep6.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"product": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"product": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_id": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_id": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_id": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-demo@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product_id": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-tomcat-eap6@1.6-6.redhat_4.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-el-1.0-api@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-lib@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch"
},
"product_reference": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch"
},
"product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src"
},
"product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch"
},
"product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src"
},
"product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386"
},
"product_reference": "httpd-devel-0:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386"
},
"product_reference": "httpd-manual-0:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386"
},
"product_reference": "httpd-tools-0:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src"
},
"product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src"
},
"product_reference": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386"
},
"product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64"
},
"product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386"
},
"product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386"
},
"product_reference": "mod_ssl-1:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src"
},
"product_reference": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src"
},
"product_reference": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-3499",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915883"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple XSS flaws due to unescaped hostnames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3499"
},
{
"category": "external",
"summary": "RHBZ#915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: multiple XSS flaws due to unescaped hostnames"
},
{
"cve": "CVE-2012-3544",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961783"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Limited DoS in chunked transfer encoding input filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3544"
},
{
"category": "external",
"summary": "RHBZ#961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Limited DoS in chunked transfer encoding input filter"
},
{
"cve": "CVE-2012-4558",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915884"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: XSS flaw in mod_proxy_balancer manager interface",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4558"
},
{
"category": "external",
"summary": "RHBZ#915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: XSS flaw in mod_proxy_balancer manager interface"
},
{
"cve": "CVE-2013-2067",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961779"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Session fixation in form authenticator",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2067"
},
{
"category": "external",
"summary": "RHBZ#961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Session fixation in form authenticator"
},
{
"cve": "CVE-2013-2071",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961803"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2071"
},
{
"category": "external",
"summary": "RHBZ#961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2071",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions"
}
]
}
RHSA-2013:1013
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and\nseveral bugs, is now available from the Red Hat Customer Portal for Red Hat\nEnterprise Linux 5 and 6, Solaris, and Microsoft Windows.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.0,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1\nRelease Notes for information on the most significant of these changes,\navailable shortly from https://access.redhat.com/site/documentation/\n\nThe following security issues are also fixed with this release:\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_proxy_balancer module\u0027s manager web interface. If a remote attacker\ncould trick a user, who was logged into the manager web interface, into\nvisiting a specially-crafted URL, it would lead to arbitrary web script\nexecution in the context of the user\u0027s manager interface session.\n(CVE-2012-4558)\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An\nattacker could possibly use these flaws to perform XSS attacks if they were\nable to make the victim\u0027s browser generate an HTTP request with a\nspecially-crafted Host header. (CVE-2012-3499)\n\nA NULL pointer dereference flaw was found in the OCSP response verification\nin OpenSSL. A malicious OCSP server could use this flaw to crash\napplications performing OCSP verification by sending a specially-crafted\nresponse. (CVE-2013-0166)\n\nIt was discovered that OpenSSL leaked timing information when decrypting\nTLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL or DTLS server as a\npadding oracle. (CVE-2013-0169)\n\nNote: CVE-2013-0166 and CVE-2013-0169 were only corrected in the packages\nfor Solaris and Windows. Updates for Red Hat Enterprise Linux can be\ndownloaded from the Red Hat Network.\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\nDuring a narrow window of time, if a remote attacker sent requests while a\nuser was logging in, it could possibly result in the attacker\u0027s requests\nbeing processed as if they were sent by the user. (CVE-2013-2067)\n\nA denial of service flaw was found in the way the Tomcat chunked transfer\nencoding input filter processed CRLF sequences. A remote attacker could\nuse this flaw to send an excessively long request, consuming network\nbandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding\nis enabled by default. (CVE-2012-3544)\n\nA flaw was found in the way the Tomcat 7 asynchronous context\nimplementation performed request management in certain circumstances. If an\napplication used AsyncListeners and threw RuntimeExceptions, Tomcat could\nsend a reply that contains information from a different user\u0027s request,\npossibly leading to the disclosure of sensitive information. This issue\nonly affected Tomcat 7. (CVE-2013-2071)\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of Red Hat JBoss Web Server 2.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Web Server 2.0.1,\nwhich corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1013",
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/",
"url": "https://access.redhat.com/site/documentation/"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=2.0.1",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=2.0.1"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html"
},
{
"category": "external",
"summary": "907589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589"
},
{
"category": "external",
"summary": "908052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908052"
},
{
"category": "external",
"summary": "915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1013.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update",
"tracking": {
"current_release_date": "2025-10-09T14:18:16+00:00",
"generator": {
"date": "2025-10-09T14:18:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2013:1013",
"initial_release_date": "2013-07-03T16:18:00+00:00",
"revision_history": [
{
"date": "2013-07-03T16:18:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-07-03T16:18:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T14:18:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 2.0",
"product": {
"name": "Red Hat JBoss Web Server 2.0",
"product_id": "Red Hat JBoss Web Server 2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-3499",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915883"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple XSS flaws due to unescaped hostnames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3499"
},
{
"category": "external",
"summary": "RHBZ#915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: multiple XSS flaws due to unescaped hostnames"
},
{
"cve": "CVE-2012-3544",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961783"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Limited DoS in chunked transfer encoding input filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3544"
},
{
"category": "external",
"summary": "RHBZ#961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Limited DoS in chunked transfer encoding input filter"
},
{
"cve": "CVE-2012-4558",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915884"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: XSS flaw in mod_proxy_balancer manager interface",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4558"
},
{
"category": "external",
"summary": "RHBZ#915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: XSS flaw in mod_proxy_balancer manager interface"
},
{
"cve": "CVE-2013-0166",
"discovery_date": "2013-02-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "908052"
}
],
"notes": [
{
"category": "description",
"text": "OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: DoS due to improper handling of OCSP response verification",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0166"
},
{
"category": "external",
"summary": "RHBZ#908052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0166"
},
{
"category": "external",
"summary": "http://www.openssl.org/news/secadv_20130205.txt",
"url": "http://www.openssl.org/news/secadv_20130205.txt"
}
],
"release_date": "2013-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: DoS due to improper handling of OCSP response verification"
},
{
"cve": "CVE-2013-0169",
"discovery_date": "2013-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907589"
}
],
"notes": [
{
"category": "description",
"text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SSL/TLS: CBC padding timing attack (lucky-13)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0169"
},
{
"category": "external",
"summary": "RHBZ#907589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169"
},
{
"category": "external",
"summary": "http://www.isg.rhul.ac.uk/tls/",
"url": "http://www.isg.rhul.ac.uk/tls/"
},
{
"category": "external",
"summary": "http://www.openssl.org/news/secadv_20130205.txt",
"url": "http://www.openssl.org/news/secadv_20130205.txt"
},
{
"category": "external",
"summary": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released",
"url": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released"
}
],
"release_date": "2013-02-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
},
{
"category": "workaround",
"details": "On OpenShift Container Platform 3.11 it\u0027s possible to edit the list of cipher suites offered by the router when performing \u0027edge\u0027, or \u0027re-encrypt\u0027 TLS modes. Please follow the documentation [1], and [2] to remove the vulnerable CBC ciphers use the modern, or intermediate cipher suites outlined by Mozilla instead [3]. In \u0027passthrough\u0027 mode TLS termination occurs in the application so that is another way to mitigate the vulnerability.\n[1] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#obtaining-router-configuration-template\n[2] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#using-configmap-replace-template\n[3] https://wiki.mozilla.org/Security/Server_Side_TLS",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SSL/TLS: CBC padding timing attack (lucky-13)"
},
{
"cve": "CVE-2013-2067",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961779"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Session fixation in form authenticator",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2067"
},
{
"category": "external",
"summary": "RHBZ#961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Session fixation in form authenticator"
},
{
"cve": "CVE-2013-2071",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961803"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2071"
},
{
"category": "external",
"summary": "RHBZ#961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2071",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions"
}
]
}
rhsa-2013:1012
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and\nseveral bugs, is now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.0,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1\nRelease Notes for information on the most significant of these changes,\navailable shortly from https://access.redhat.com/site/documentation/\n\nThe following security issues are also fixed with this release:\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_proxy_balancer module\u0027s manager web interface. If a remote attacker\ncould trick a user, who was logged into the manager web interface, into\nvisiting a specially-crafted URL, it would lead to arbitrary web script\nexecution in the context of the user\u0027s manager interface session.\n(CVE-2012-4558)\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An\nattacker could possibly use these flaws to perform XSS attacks if they were\nable to make the victim\u0027s browser generate an HTTP request with a\nspecially-crafted Host header. (CVE-2012-3499)\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\nDuring a narrow window of time, if a remote attacker sent requests while a\nuser was logging in, it could possibly result in the attacker\u0027s requests\nbeing processed as if they were sent by the user. (CVE-2013-2067)\n\nA denial of service flaw was found in the way the Tomcat chunked transfer\nencoding input filter processed CRLF sequences. A remote attacker could\nuse this flaw to send an excessively long request, consuming network\nbandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding\nis enabled by default. (CVE-2012-3544)\n\nA flaw was found in the way the Tomcat 7 asynchronous context\nimplementation performed request management in certain circumstances. If an\napplication used AsyncListeners and threw RuntimeExceptions, Tomcat could\nsend a reply that contains information from a different user\u0027s request,\npossibly leading to the disclosure of sensitive information. This issue\nonly affected Tomcat 7. (CVE-2013-2071)\n\nNote: Do not install Red Hat JBoss Web Server 2 on a host which has Red Hat\nJBoss Web Server 1 installed.\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of Red Hat JBoss Web Server 2.0.0 on Red Hat Enterprise Linux 6\nare advised to upgrade to Red Hat JBoss Web Server 2.0.1. The JBoss server\nprocess must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1012",
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/",
"url": "https://access.redhat.com/site/documentation/"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html"
},
{
"category": "external",
"summary": "915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1012.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update",
"tracking": {
"current_release_date": "2025-10-09T14:18:16+00:00",
"generator": {
"date": "2025-10-09T14:18:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2013:1012",
"initial_release_date": "2013-07-03T15:43:00+00:00",
"revision_history": [
{
"date": "2013-07-03T15:43:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-07-03T15:47:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T14:18:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"product": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"product": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"product": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"product": {
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"product_id": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk@1.2.37-2.redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el6.src",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el6.src",
"product_id": "httpd-0:2.2.22-23.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"product": {
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"product_id": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.40-5_patch_01.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"product": {
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"product_id": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.37-10_patch_01.ep6.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"product": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product_id": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-tomcat-eap6@1.6-6.redhat_4.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"product": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_id": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_id": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-demo@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_id": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-el-1.0-api@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-lib@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product_id": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6-debuginfo@1.0.15-1.redhat_1.ep6.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product": {
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product_id": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.27-4.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product_id": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.4-1.Final.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_id": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.37-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-devel-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-devel-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-tools-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-tools-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.22-23.ep6.el6.i386",
"product": {
"name": "mod_ssl-1:2.2.22-23.ep6.el6.i386",
"product_id": "mod_ssl-1:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-manual-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-manual-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.22-23.ep6.el6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product_id": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6-debuginfo@1.0.15-1.redhat_1.ep6.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product": {
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product_id": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.27-4.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product_id": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.4-1.Final.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_id": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.37-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"product_id": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.22-23.ep6.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch"
},
"product_reference": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch"
},
"product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src"
},
"product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch"
},
"product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src"
},
"product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-devel-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-manual-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-tools-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src"
},
"product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src"
},
"product_reference": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386"
},
"product_reference": "mod_ssl-1:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386"
},
"product_reference": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64"
},
"product_reference": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src"
},
"product_reference": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src"
},
"product_reference": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-3499",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915883"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple XSS flaws due to unescaped hostnames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3499"
},
{
"category": "external",
"summary": "RHBZ#915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: multiple XSS flaws due to unescaped hostnames"
},
{
"cve": "CVE-2012-3544",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961783"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Limited DoS in chunked transfer encoding input filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3544"
},
{
"category": "external",
"summary": "RHBZ#961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Limited DoS in chunked transfer encoding input filter"
},
{
"cve": "CVE-2012-4558",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915884"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: XSS flaw in mod_proxy_balancer manager interface",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4558"
},
{
"category": "external",
"summary": "RHBZ#915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: XSS flaw in mod_proxy_balancer manager interface"
},
{
"cve": "CVE-2013-2067",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961779"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Session fixation in form authenticator",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2067"
},
{
"category": "external",
"summary": "RHBZ#961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Session fixation in form authenticator"
},
{
"cve": "CVE-2013-2071",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961803"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2071"
},
{
"category": "external",
"summary": "RHBZ#961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2071",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions"
}
]
}
rhsa-2013:1013
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and\nseveral bugs, is now available from the Red Hat Customer Portal for Red Hat\nEnterprise Linux 5 and 6, Solaris, and Microsoft Windows.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.0,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1\nRelease Notes for information on the most significant of these changes,\navailable shortly from https://access.redhat.com/site/documentation/\n\nThe following security issues are also fixed with this release:\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_proxy_balancer module\u0027s manager web interface. If a remote attacker\ncould trick a user, who was logged into the manager web interface, into\nvisiting a specially-crafted URL, it would lead to arbitrary web script\nexecution in the context of the user\u0027s manager interface session.\n(CVE-2012-4558)\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An\nattacker could possibly use these flaws to perform XSS attacks if they were\nable to make the victim\u0027s browser generate an HTTP request with a\nspecially-crafted Host header. (CVE-2012-3499)\n\nA NULL pointer dereference flaw was found in the OCSP response verification\nin OpenSSL. A malicious OCSP server could use this flaw to crash\napplications performing OCSP verification by sending a specially-crafted\nresponse. (CVE-2013-0166)\n\nIt was discovered that OpenSSL leaked timing information when decrypting\nTLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL or DTLS server as a\npadding oracle. (CVE-2013-0169)\n\nNote: CVE-2013-0166 and CVE-2013-0169 were only corrected in the packages\nfor Solaris and Windows. Updates for Red Hat Enterprise Linux can be\ndownloaded from the Red Hat Network.\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\nDuring a narrow window of time, if a remote attacker sent requests while a\nuser was logging in, it could possibly result in the attacker\u0027s requests\nbeing processed as if they were sent by the user. (CVE-2013-2067)\n\nA denial of service flaw was found in the way the Tomcat chunked transfer\nencoding input filter processed CRLF sequences. A remote attacker could\nuse this flaw to send an excessively long request, consuming network\nbandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding\nis enabled by default. (CVE-2012-3544)\n\nA flaw was found in the way the Tomcat 7 asynchronous context\nimplementation performed request management in certain circumstances. If an\napplication used AsyncListeners and threw RuntimeExceptions, Tomcat could\nsend a reply that contains information from a different user\u0027s request,\npossibly leading to the disclosure of sensitive information. This issue\nonly affected Tomcat 7. (CVE-2013-2071)\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of Red Hat JBoss Web Server 2.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Web Server 2.0.1,\nwhich corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1013",
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/",
"url": "https://access.redhat.com/site/documentation/"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=2.0.1",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=2.0.1"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html"
},
{
"category": "external",
"summary": "907589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589"
},
{
"category": "external",
"summary": "908052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908052"
},
{
"category": "external",
"summary": "915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1013.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update",
"tracking": {
"current_release_date": "2025-10-09T14:18:16+00:00",
"generator": {
"date": "2025-10-09T14:18:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2013:1013",
"initial_release_date": "2013-07-03T16:18:00+00:00",
"revision_history": [
{
"date": "2013-07-03T16:18:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-07-03T16:18:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T14:18:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 2.0",
"product": {
"name": "Red Hat JBoss Web Server 2.0",
"product_id": "Red Hat JBoss Web Server 2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-3499",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915883"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple XSS flaws due to unescaped hostnames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3499"
},
{
"category": "external",
"summary": "RHBZ#915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: multiple XSS flaws due to unescaped hostnames"
},
{
"cve": "CVE-2012-3544",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961783"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Limited DoS in chunked transfer encoding input filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3544"
},
{
"category": "external",
"summary": "RHBZ#961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Limited DoS in chunked transfer encoding input filter"
},
{
"cve": "CVE-2012-4558",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915884"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: XSS flaw in mod_proxy_balancer manager interface",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4558"
},
{
"category": "external",
"summary": "RHBZ#915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: XSS flaw in mod_proxy_balancer manager interface"
},
{
"cve": "CVE-2013-0166",
"discovery_date": "2013-02-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "908052"
}
],
"notes": [
{
"category": "description",
"text": "OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: DoS due to improper handling of OCSP response verification",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0166"
},
{
"category": "external",
"summary": "RHBZ#908052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0166"
},
{
"category": "external",
"summary": "http://www.openssl.org/news/secadv_20130205.txt",
"url": "http://www.openssl.org/news/secadv_20130205.txt"
}
],
"release_date": "2013-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: DoS due to improper handling of OCSP response verification"
},
{
"cve": "CVE-2013-0169",
"discovery_date": "2013-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907589"
}
],
"notes": [
{
"category": "description",
"text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SSL/TLS: CBC padding timing attack (lucky-13)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0169"
},
{
"category": "external",
"summary": "RHBZ#907589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169"
},
{
"category": "external",
"summary": "http://www.isg.rhul.ac.uk/tls/",
"url": "http://www.isg.rhul.ac.uk/tls/"
},
{
"category": "external",
"summary": "http://www.openssl.org/news/secadv_20130205.txt",
"url": "http://www.openssl.org/news/secadv_20130205.txt"
},
{
"category": "external",
"summary": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released",
"url": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released"
}
],
"release_date": "2013-02-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
},
{
"category": "workaround",
"details": "On OpenShift Container Platform 3.11 it\u0027s possible to edit the list of cipher suites offered by the router when performing \u0027edge\u0027, or \u0027re-encrypt\u0027 TLS modes. Please follow the documentation [1], and [2] to remove the vulnerable CBC ciphers use the modern, or intermediate cipher suites outlined by Mozilla instead [3]. In \u0027passthrough\u0027 mode TLS termination occurs in the application so that is another way to mitigate the vulnerability.\n[1] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#obtaining-router-configuration-template\n[2] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#using-configmap-replace-template\n[3] https://wiki.mozilla.org/Security/Server_Side_TLS",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SSL/TLS: CBC padding timing attack (lucky-13)"
},
{
"cve": "CVE-2013-2067",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961779"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Session fixation in form authenticator",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2067"
},
{
"category": "external",
"summary": "RHBZ#961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Session fixation in form authenticator"
},
{
"cve": "CVE-2013-2071",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961803"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2071"
},
{
"category": "external",
"summary": "RHBZ#961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2071",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions"
}
]
}
rhsa-2013:1011
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and\nseveral bugs, is now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.0,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1\nRelease Notes for information on the most significant of these changes,\navailable shortly from https://access.redhat.com/site/documentation/\n\nThe following security issues are also fixed with this release:\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_proxy_balancer module\u0027s manager web interface. If a remote attacker\ncould trick a user, who was logged into the manager web interface, into\nvisiting a specially-crafted URL, it would lead to arbitrary web script\nexecution in the context of the user\u0027s manager interface session.\n(CVE-2012-4558)\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An\nattacker could possibly use these flaws to perform XSS attacks if they were\nable to make the victim\u0027s browser generate an HTTP request with a\nspecially-crafted Host header. (CVE-2012-3499)\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\nDuring a narrow window of time, if a remote attacker sent requests while a\nuser was logging in, it could possibly result in the attacker\u0027s requests\nbeing processed as if they were sent by the user. (CVE-2013-2067)\n\nA denial of service flaw was found in the way the Tomcat chunked transfer\nencoding input filter processed CRLF sequences. A remote attacker could\nuse this flaw to send an excessively long request, consuming network\nbandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding\nis enabled by default. (CVE-2012-3544)\n\nA flaw was found in the way the Tomcat 7 asynchronous context\nimplementation performed request management in certain circumstances. If an\napplication used AsyncListeners and threw RuntimeExceptions, Tomcat could\nsend a reply that contains information from a different user\u0027s request,\npossibly leading to the disclosure of sensitive information. This issue\nonly affected Tomcat 7. (CVE-2013-2071)\n\nNote: Do not install Red Hat JBoss Web Server 2 on a host which has Red Hat\nJBoss Web Server 1 installed.\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of Red Hat JBoss Web Server 2.0.0 on Red Hat Enterprise Linux 5\nare advised to upgrade to Red Hat JBoss Web Server 2.0.1. The JBoss server\nprocess must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1011",
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/",
"url": "https://access.redhat.com/site/documentation/"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html"
},
{
"category": "external",
"summary": "915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1011.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update",
"tracking": {
"current_release_date": "2025-10-09T14:18:14+00:00",
"generator": {
"date": "2025-10-09T14:18:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2013:1011",
"initial_release_date": "2013-07-03T15:38:00+00:00",
"revision_history": [
{
"date": "2013-07-03T15:38:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-07-03T15:47:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T14:18:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el5.x86_64",
"product_id": "httpd-0:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"product_id": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"product_id": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"product_id": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"product_id": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el5.i386",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el5.i386",
"product_id": "httpd-0:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.22-23.ep6.el5.i386",
"product": {
"name": "httpd-devel-0:2.2.22-23.ep6.el5.i386",
"product_id": "httpd-devel-0:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.22-23.ep6.el5.i386",
"product": {
"name": "httpd-tools-0:2.2.22-23.ep6.el5.i386",
"product_id": "httpd-tools-0:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.22-23.ep6.el5.i386",
"product": {
"name": "mod_ssl-1:2.2.22-23.ep6.el5.i386",
"product_id": "mod_ssl-1:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.22-23.ep6.el5.i386",
"product": {
"name": "httpd-manual-0:2.2.22-23.ep6.el5.i386",
"product_id": "httpd-manual-0:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"product": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"product": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"product": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"product": {
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"product_id": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk@1.2.37-2.redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el5.src",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el5.src",
"product_id": "httpd-0:2.2.22-23.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"product": {
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"product_id": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.37-8_patch_01.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"product": {
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"product_id": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.40-9_patch_01.ep6.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"product": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"product": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_id": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_id": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_id": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-demo@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product_id": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-tomcat-eap6@1.6-6.redhat_4.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-el-1.0-api@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-lib@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch"
},
"product_reference": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch"
},
"product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src"
},
"product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch"
},
"product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src"
},
"product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386"
},
"product_reference": "httpd-devel-0:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386"
},
"product_reference": "httpd-manual-0:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386"
},
"product_reference": "httpd-tools-0:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src"
},
"product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src"
},
"product_reference": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386"
},
"product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64"
},
"product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386"
},
"product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386"
},
"product_reference": "mod_ssl-1:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src"
},
"product_reference": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src"
},
"product_reference": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-3499",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915883"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple XSS flaws due to unescaped hostnames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3499"
},
{
"category": "external",
"summary": "RHBZ#915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: multiple XSS flaws due to unescaped hostnames"
},
{
"cve": "CVE-2012-3544",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961783"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Limited DoS in chunked transfer encoding input filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3544"
},
{
"category": "external",
"summary": "RHBZ#961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Limited DoS in chunked transfer encoding input filter"
},
{
"cve": "CVE-2012-4558",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915884"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: XSS flaw in mod_proxy_balancer manager interface",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4558"
},
{
"category": "external",
"summary": "RHBZ#915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: XSS flaw in mod_proxy_balancer manager interface"
},
{
"cve": "CVE-2013-2067",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961779"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Session fixation in form authenticator",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2067"
},
{
"category": "external",
"summary": "RHBZ#961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Session fixation in form authenticator"
},
{
"cve": "CVE-2013-2071",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961803"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2071"
},
{
"category": "external",
"summary": "RHBZ#961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2071",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions"
}
]
}
rhsa-2013_1011
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and\nseveral bugs, is now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.0,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1\nRelease Notes for information on the most significant of these changes,\navailable shortly from https://access.redhat.com/site/documentation/\n\nThe following security issues are also fixed with this release:\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_proxy_balancer module\u0027s manager web interface. If a remote attacker\ncould trick a user, who was logged into the manager web interface, into\nvisiting a specially-crafted URL, it would lead to arbitrary web script\nexecution in the context of the user\u0027s manager interface session.\n(CVE-2012-4558)\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An\nattacker could possibly use these flaws to perform XSS attacks if they were\nable to make the victim\u0027s browser generate an HTTP request with a\nspecially-crafted Host header. (CVE-2012-3499)\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\nDuring a narrow window of time, if a remote attacker sent requests while a\nuser was logging in, it could possibly result in the attacker\u0027s requests\nbeing processed as if they were sent by the user. (CVE-2013-2067)\n\nA denial of service flaw was found in the way the Tomcat chunked transfer\nencoding input filter processed CRLF sequences. A remote attacker could\nuse this flaw to send an excessively long request, consuming network\nbandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding\nis enabled by default. (CVE-2012-3544)\n\nA flaw was found in the way the Tomcat 7 asynchronous context\nimplementation performed request management in certain circumstances. If an\napplication used AsyncListeners and threw RuntimeExceptions, Tomcat could\nsend a reply that contains information from a different user\u0027s request,\npossibly leading to the disclosure of sensitive information. This issue\nonly affected Tomcat 7. (CVE-2013-2071)\n\nNote: Do not install Red Hat JBoss Web Server 2 on a host which has Red Hat\nJBoss Web Server 1 installed.\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of Red Hat JBoss Web Server 2.0.0 on Red Hat Enterprise Linux 5\nare advised to upgrade to Red Hat JBoss Web Server 2.0.1. The JBoss server\nprocess must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1011",
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/",
"url": "https://access.redhat.com/site/documentation/"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html"
},
{
"category": "external",
"summary": "915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1011.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update",
"tracking": {
"current_release_date": "2024-11-25T11:55:04+00:00",
"generator": {
"date": "2024-11-25T11:55:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2013:1011",
"initial_release_date": "2013-07-03T15:38:00+00:00",
"revision_history": [
{
"date": "2013-07-03T15:38:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-07-03T15:47:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T11:55:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el5.x86_64",
"product_id": "httpd-0:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"product_id": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"product_id": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"product_id": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"product": {
"name": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"product_id": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el5.i386",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el5.i386",
"product_id": "httpd-0:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.22-23.ep6.el5.i386",
"product": {
"name": "httpd-devel-0:2.2.22-23.ep6.el5.i386",
"product_id": "httpd-devel-0:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.22-23.ep6.el5.i386",
"product": {
"name": "httpd-tools-0:2.2.22-23.ep6.el5.i386",
"product_id": "httpd-tools-0:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.22-23.ep6.el5.i386",
"product": {
"name": "mod_ssl-1:2.2.22-23.ep6.el5.i386",
"product_id": "mod_ssl-1:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.22-23.ep6.el5.i386",
"product": {
"name": "httpd-manual-0:2.2.22-23.ep6.el5.i386",
"product_id": "httpd-manual-0:2.2.22-23.ep6.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"product": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"product": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"product": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"product": {
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"product_id": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk@1.2.37-2.redhat_1.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el5.src",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el5.src",
"product_id": "httpd-0:2.2.22-23.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"product": {
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"product_id": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.37-8_patch_01.ep6.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"product": {
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"product_id": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.40-9_patch_01.ep6.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"product": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"product": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_id": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_id": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product": {
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_id": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-demo@1.2.4-1.Final_redhat_1.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product_id": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-tomcat-eap6@1.6-6.redhat_4.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_id": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.37-8_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-el-1.0-api@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product": {
"name": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_id": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-lib@7.0.40-9_patch_01.ep6.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch"
},
"product_reference": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch"
},
"product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src"
},
"product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch"
},
"product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src"
},
"product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386"
},
"product_reference": "httpd-devel-0:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386"
},
"product_reference": "httpd-manual-0:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386"
},
"product_reference": "httpd-tools-0:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src"
},
"product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch"
},
"product_reference": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src"
},
"product_reference": "mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386"
},
"product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64"
},
"product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386"
},
"product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.22-23.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386"
},
"product_reference": "mod_ssl-1:2.2.22-23.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64"
},
"product_reference": "mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src"
},
"product_reference": "tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src"
},
"product_reference": "tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
"product_id": "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
},
"product_reference": "tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-3499",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915883"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple XSS flaws due to unescaped hostnames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3499"
},
{
"category": "external",
"summary": "RHBZ#915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: multiple XSS flaws due to unescaped hostnames"
},
{
"cve": "CVE-2012-3544",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961783"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Limited DoS in chunked transfer encoding input filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3544"
},
{
"category": "external",
"summary": "RHBZ#961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Limited DoS in chunked transfer encoding input filter"
},
{
"cve": "CVE-2012-4558",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915884"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: XSS flaw in mod_proxy_balancer manager interface",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4558"
},
{
"category": "external",
"summary": "RHBZ#915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: XSS flaw in mod_proxy_balancer manager interface"
},
{
"cve": "CVE-2013-2067",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961779"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Session fixation in form authenticator",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2067"
},
{
"category": "external",
"summary": "RHBZ#961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Session fixation in form authenticator"
},
{
"cve": "CVE-2013-2071",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961803"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2071"
},
{
"category": "external",
"summary": "RHBZ#961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2071",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:38:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1011"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el5.src",
"5Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.noarch",
"5Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el5.src",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.src",
"5Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el5.noarch",
"5Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.i386",
"5Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.i386",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.src",
"5Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el5.x86_64",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-0:6.0.37-8_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-lib-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-log4j-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat6-webapps-0:6.0.37-8_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-0:7.0.40-9_patch_01.ep6.el5.src",
"5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-lib-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-9_patch_01.ep6.el5.noarch",
"5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-9_patch_01.ep6.el5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions"
}
]
}
rhsa-2013_1013
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and\nseveral bugs, is now available from the Red Hat Customer Portal for Red Hat\nEnterprise Linux 5 and 6, Solaris, and Microsoft Windows.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.0,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1\nRelease Notes for information on the most significant of these changes,\navailable shortly from https://access.redhat.com/site/documentation/\n\nThe following security issues are also fixed with this release:\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_proxy_balancer module\u0027s manager web interface. If a remote attacker\ncould trick a user, who was logged into the manager web interface, into\nvisiting a specially-crafted URL, it would lead to arbitrary web script\nexecution in the context of the user\u0027s manager interface session.\n(CVE-2012-4558)\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An\nattacker could possibly use these flaws to perform XSS attacks if they were\nable to make the victim\u0027s browser generate an HTTP request with a\nspecially-crafted Host header. (CVE-2012-3499)\n\nA NULL pointer dereference flaw was found in the OCSP response verification\nin OpenSSL. A malicious OCSP server could use this flaw to crash\napplications performing OCSP verification by sending a specially-crafted\nresponse. (CVE-2013-0166)\n\nIt was discovered that OpenSSL leaked timing information when decrypting\nTLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL or DTLS server as a\npadding oracle. (CVE-2013-0169)\n\nNote: CVE-2013-0166 and CVE-2013-0169 were only corrected in the packages\nfor Solaris and Windows. Updates for Red Hat Enterprise Linux can be\ndownloaded from the Red Hat Network.\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\nDuring a narrow window of time, if a remote attacker sent requests while a\nuser was logging in, it could possibly result in the attacker\u0027s requests\nbeing processed as if they were sent by the user. (CVE-2013-2067)\n\nA denial of service flaw was found in the way the Tomcat chunked transfer\nencoding input filter processed CRLF sequences. A remote attacker could\nuse this flaw to send an excessively long request, consuming network\nbandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding\nis enabled by default. (CVE-2012-3544)\n\nA flaw was found in the way the Tomcat 7 asynchronous context\nimplementation performed request management in certain circumstances. If an\napplication used AsyncListeners and threw RuntimeExceptions, Tomcat could\nsend a reply that contains information from a different user\u0027s request,\npossibly leading to the disclosure of sensitive information. This issue\nonly affected Tomcat 7. (CVE-2013-2071)\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of Red Hat JBoss Web Server 2.0.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss Web Server 2.0.1,\nwhich corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1013",
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/",
"url": "https://access.redhat.com/site/documentation/"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=2.0.1",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=2.0.1"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html"
},
{
"category": "external",
"summary": "907589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589"
},
{
"category": "external",
"summary": "908052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908052"
},
{
"category": "external",
"summary": "915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1013.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update",
"tracking": {
"current_release_date": "2024-11-25T11:55:15+00:00",
"generator": {
"date": "2024-11-25T11:55:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2013:1013",
"initial_release_date": "2013-07-03T16:18:00+00:00",
"revision_history": [
{
"date": "2013-07-03T16:18:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-07-03T16:18:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T11:55:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 2.0",
"product": {
"name": "Red Hat JBoss Web Server 2.0",
"product_id": "Red Hat JBoss Web Server 2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-3499",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915883"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple XSS flaws due to unescaped hostnames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3499"
},
{
"category": "external",
"summary": "RHBZ#915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: multiple XSS flaws due to unescaped hostnames"
},
{
"cve": "CVE-2012-3544",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961783"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Limited DoS in chunked transfer encoding input filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3544"
},
{
"category": "external",
"summary": "RHBZ#961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Limited DoS in chunked transfer encoding input filter"
},
{
"cve": "CVE-2012-4558",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915884"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: XSS flaw in mod_proxy_balancer manager interface",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4558"
},
{
"category": "external",
"summary": "RHBZ#915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: XSS flaw in mod_proxy_balancer manager interface"
},
{
"cve": "CVE-2013-0166",
"discovery_date": "2013-02-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "908052"
}
],
"notes": [
{
"category": "description",
"text": "OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: DoS due to improper handling of OCSP response verification",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0166"
},
{
"category": "external",
"summary": "RHBZ#908052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0166"
},
{
"category": "external",
"summary": "http://www.openssl.org/news/secadv_20130205.txt",
"url": "http://www.openssl.org/news/secadv_20130205.txt"
}
],
"release_date": "2013-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: DoS due to improper handling of OCSP response verification"
},
{
"cve": "CVE-2013-0169",
"discovery_date": "2013-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "907589"
}
],
"notes": [
{
"category": "description",
"text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SSL/TLS: CBC padding timing attack (lucky-13)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0169"
},
{
"category": "external",
"summary": "RHBZ#907589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169"
},
{
"category": "external",
"summary": "http://www.isg.rhul.ac.uk/tls/",
"url": "http://www.isg.rhul.ac.uk/tls/"
},
{
"category": "external",
"summary": "http://www.openssl.org/news/secadv_20130205.txt",
"url": "http://www.openssl.org/news/secadv_20130205.txt"
},
{
"category": "external",
"summary": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released",
"url": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released"
}
],
"release_date": "2013-02-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
},
{
"category": "workaround",
"details": "On OpenShift Container Platform 3.11 it\u0027s possible to edit the list of cipher suites offered by the router when performing \u0027edge\u0027, or \u0027re-encrypt\u0027 TLS modes. Please follow the documentation [1], and [2] to remove the vulnerable CBC ciphers use the modern, or intermediate cipher suites outlined by Mozilla instead [3]. In \u0027passthrough\u0027 mode TLS termination occurs in the application so that is another way to mitigate the vulnerability.\n[1] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#obtaining-router-configuration-template\n[2] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#using-configmap-replace-template\n[3] https://wiki.mozilla.org/Security/Server_Side_TLS",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SSL/TLS: CBC padding timing attack (lucky-13)"
},
{
"cve": "CVE-2013-2067",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961779"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Session fixation in form authenticator",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2067"
},
{
"category": "external",
"summary": "RHBZ#961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Session fixation in form authenticator"
},
{
"cve": "CVE-2013-2071",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961803"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2071"
},
{
"category": "external",
"summary": "RHBZ#961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2071",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T16:18:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).",
"product_ids": [
"Red Hat JBoss Web Server 2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1013"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions"
}
]
}
RHSA-2013:1012
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 2.0.1, which fixes multiple security issues and\nseveral bugs, is now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nThis release serves as a replacement for Red Hat JBoss Web Server 2.0.0,\nand includes several bug fixes. Refer to the Red Hat JBoss Web Server 2.0.1\nRelease Notes for information on the most significant of these changes,\navailable shortly from https://access.redhat.com/site/documentation/\n\nThe following security issues are also fixed with this release:\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_proxy_balancer module\u0027s manager web interface. If a remote attacker\ncould trick a user, who was logged into the manager web interface, into\nvisiting a specially-crafted URL, it would lead to arbitrary web script\nexecution in the context of the user\u0027s manager interface session.\n(CVE-2012-4558)\n\nCross-site scripting (XSS) flaws were found in the Apache HTTP Server\nmod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An\nattacker could possibly use these flaws to perform XSS attacks if they were\nable to make the victim\u0027s browser generate an HTTP request with a\nspecially-crafted Host header. (CVE-2012-3499)\n\nA session fixation flaw was found in the Tomcat FormAuthenticator module.\nDuring a narrow window of time, if a remote attacker sent requests while a\nuser was logging in, it could possibly result in the attacker\u0027s requests\nbeing processed as if they were sent by the user. (CVE-2013-2067)\n\nA denial of service flaw was found in the way the Tomcat chunked transfer\nencoding input filter processed CRLF sequences. A remote attacker could\nuse this flaw to send an excessively long request, consuming network\nbandwidth, CPU, and memory on the Tomcat server. Chunked transfer encoding\nis enabled by default. (CVE-2012-3544)\n\nA flaw was found in the way the Tomcat 7 asynchronous context\nimplementation performed request management in certain circumstances. If an\napplication used AsyncListeners and threw RuntimeExceptions, Tomcat could\nsend a reply that contains information from a different user\u0027s request,\npossibly leading to the disclosure of sensitive information. This issue\nonly affected Tomcat 7. (CVE-2013-2071)\n\nNote: Do not install Red Hat JBoss Web Server 2 on a host which has Red Hat\nJBoss Web Server 1 installed.\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of Red Hat JBoss Web Server 2.0.0 on Red Hat Enterprise Linux 6\nare advised to upgrade to Red Hat JBoss Web Server 2.0.1. The JBoss server\nprocess must be restarted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1012",
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/",
"url": "https://access.redhat.com/site/documentation/"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Web_Server/2/html-single/Installation_Guide/index.html"
},
{
"category": "external",
"summary": "915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1012.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update",
"tracking": {
"current_release_date": "2025-10-09T14:18:16+00:00",
"generator": {
"date": "2025-10-09T14:18:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2013:1012",
"initial_release_date": "2013-07-03T15:43:00+00:00",
"revision_history": [
{
"date": "2013-07-03T15:43:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-07-03T15:47:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T14:18:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"product": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"product": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"product": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"product": {
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"product_id": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk@1.2.37-2.redhat_1.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el6.src",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el6.src",
"product_id": "httpd-0:2.2.22-23.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"product": {
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"product_id": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.40-5_patch_01.ep6.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"product": {
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"product_id": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.37-10_patch_01.ep6.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"product": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"product_id": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ecj3@3.7.2-6.redhat_1.ep6.el6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product_id": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-tomcat-eap6@1.6-6.redhat_4.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product_id": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-pool-eap6@1.6-6.redhat_4.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"product": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"product_id": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dom4j@1.6.1-19.redhat_5.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"product": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"product_id": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-eap6@1.0.15-4.redhat_1.ep6.el6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_id": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_id": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-demo@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_id": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_id": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.2.4-1.Final_redhat_1.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-el-1.0-api@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-lib@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_id": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.40-5_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-lib@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product": {
"name": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_id": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.37-10_patch_01.ep6.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product_id": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6-debuginfo@1.0.15-1.redhat_1.ep6.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product": {
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product_id": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.27-4.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product_id": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.4-1.Final.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_id": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.37-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-devel-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-devel-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-tools-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-tools-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.22-23.ep6.el6.i386",
"product": {
"name": "mod_ssl-1:2.2.22-23.ep6.el6.i386",
"product_id": "mod_ssl-1:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-manual-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-manual-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"product": {
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"product_id": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.22-23.ep6.el6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product_id": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6@1.0.15-1.redhat_1.ep6.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product_id": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-daemon-jsvc-eap6-debuginfo@1.0.15-1.redhat_1.ep6.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product": {
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product_id": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.27-4.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product_id": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.1.27-4.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product_id": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.2.4-1.Final.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product_id": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.4-1.Final.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_id": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.37-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_id": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-ap22@1.2.37-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_id": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_jk-manual@1.2.37-2.redhat_1.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.22-23.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.22-23.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.2.22-23.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"product_id": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.22-23.ep6.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.22-23.ep6.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"product_id": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.22-23.ep6.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src"
},
"product_reference": "apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64"
},
"product_reference": "apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src"
},
"product_reference": "apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch"
},
"product_reference": "apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch"
},
"product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src"
},
"product_reference": "dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch"
},
"product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src"
},
"product_reference": "ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-devel-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-manual-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386"
},
"product_reference": "httpd-tools-0:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src"
},
"product_reference": "mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch"
},
"product_reference": "mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src"
},
"product_reference": "mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386"
},
"product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64"
},
"product_reference": "mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.22-23.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386"
},
"product_reference": "mod_ssl-1:2.2.22-23.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64"
},
"product_reference": "mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64"
},
"product_reference": "tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386"
},
"product_reference": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64"
},
"product_reference": "tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src"
},
"product_reference": "tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src"
},
"product_reference": "tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
"product_id": "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
},
"product_reference": "tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-3499",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915883"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: multiple XSS flaws due to unescaped hostnames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3499"
},
{
"category": "external",
"summary": "RHBZ#915883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3499"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: multiple XSS flaws due to unescaped hostnames"
},
{
"cve": "CVE-2012-3544",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961783"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Limited DoS in chunked transfer encoding input filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw affects Apache Tomcat 6.0.30 - 6.0.36 and 7.0.0 - 7.0.29. It does not affect JBoss Web.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-3544"
},
{
"category": "external",
"summary": "RHBZ#961783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961783"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3544"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Limited DoS in chunked transfer encoding input filter"
},
{
"cve": "CVE-2012-4558",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "915884"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: XSS flaw in mod_proxy_balancer manager interface",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4558"
},
{
"category": "external",
"summary": "RHBZ#915884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=915884"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4558"
}
],
"release_date": "2013-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: XSS flaw in mod_proxy_balancer manager interface"
},
{
"cve": "CVE-2013-2067",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961779"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Session fixation in form authenticator",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw allows an attacker to circumvent a session fixation prevention mechanism which was implemented in tomcat 5.5.x \u003e= 5.5.29, 6.0.x \u003e= 6.0.21 and 7.x. Earlier versions of tomcat do not include this mechanism, and are therefore not affected by this flaw. JBoss Web as included in JBoss 5.x products also does not include this mechanism, and is not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2067"
},
{
"category": "external",
"summary": "RHBZ#961779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961779"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2067"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Session fixation in form authenticator"
},
{
"cve": "CVE-2013-2071",
"discovery_date": "2013-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "961803"
}
],
"notes": [
{
"category": "description",
"text": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects tomcat 7. Tomcat 5 and 6 are not affected. The jbossweb servlet container is also not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2071"
},
{
"category": "external",
"summary": "RHBZ#961803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=961803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2071",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071"
}
],
"release_date": "2013-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-03T15:43:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1012"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-daemon-eap6-1:1.0.15-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-1.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:apache-commons-pool-eap6-0:1.6-6.redhat_4.ep6.el6.src",
"6Server-JBEWS-2:apache-commons-pool-tomcat-eap6-0:1.6-6.redhat_4.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.noarch",
"6Server-JBEWS-2:dom4j-0:1.6.1-19.redhat_5.ep6.el6.src",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:ecj3-1:3.7.2-6.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.src",
"6Server-JBEWS-2:httpd-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-debuginfo-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-devel-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-manual-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:httpd-tools-0:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-0:1.2.4-1.Final_redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-demo-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_cluster-native-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.4-1.Final.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_cluster-tomcat6-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_cluster-tomcat7-0:1.2.4-1.Final_redhat_1.ep6.el6.noarch",
"6Server-JBEWS-2:mod_jk-0:1.2.37-2.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-ap22-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-debuginfo-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:mod_jk-manual-0:1.2.37-2.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.i386",
"6Server-JBEWS-2:mod_ssl-1:2.2.22-23.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.src",
"6Server-JBEWS-2:tomcat-native-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.i386",
"6Server-JBEWS-2:tomcat-native-debuginfo-0:1.1.27-4.redhat_1.ep6.el6.x86_64",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-0:6.0.37-10_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-el-1.0-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-javadoc-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-lib-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-log4j-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat6-webapps-0:6.0.37-10_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-0:7.0.40-5_patch_01.ep6.el6.src",
"6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-el-1.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-lib-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-5_patch_01.ep6.el6.noarch",
"6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-5_patch_01.ep6.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions"
}
]
}
CERTA-2014-AVI-025
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle Supply Chain Products Suite. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Oracle Supply Chain Products Suite versions 12.2.3 et antérieures | ||
| Oracle | N/A | Oracle Supply Chain Products Suite versions 6.3.2 et antérieures | ||
| Oracle | N/A | Oracle Supply Chain Products Suite version 7.2.0.3 | ||
| Oracle | N/A | Oracle Supply Chain Products Suite versions 7.3.1 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Supply Chain Products Suite versions 12.2.3 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Supply Chain Products Suite versions 6.3.2 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Supply Chain Products Suite version 7.2.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Supply Chain Products Suite versions 7.3.1 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-0399",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0399"
},
{
"name": "CVE-2013-2071",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2071"
},
{
"name": "CVE-2013-5877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5877"
},
{
"name": "CVE-2014-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0444"
},
{
"name": "CVE-2013-5795",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5795"
},
{
"name": "CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"name": "CVE-2013-5880",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5880"
},
{
"name": "CVE-2013-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5868"
},
{
"name": "CVE-2014-0371",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0371"
},
{
"name": "CVE-2013-5871",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5871"
},
{
"name": "CVE-2014-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0434"
},
{
"name": "CVE-2013-5897",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5897"
},
{
"name": "CVE-2014-0372",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0372"
},
{
"name": "CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"name": "CVE-2014-0379",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0379"
},
{
"name": "CVE-2014-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0435"
}
],
"initial_release_date": "2014-01-15T00:00:00",
"last_revision_date": "2014-01-15T00:00:00",
"links": [],
"reference": "CERTA-2014-AVI-025",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-01-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Supply Chain Products Suite\u003c/span\u003e. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Supply Chain Products Suite",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2014 du 14 janvier 2014",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
}
]
}
CERTA-2014-AVI-032
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle VirtualBox et Apache Tomcat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Secure Global Desktop versions 4.6.3 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle VirtualBox versions 3.2.20 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle VirtualBox versions 4.3.6 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0419"
},
{
"name": "CVE-2013-2071",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2071"
},
{
"name": "CVE-2014-0404",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0404"
},
{
"name": "CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"name": "CVE-2014-0405",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0405"
},
{
"name": "CVE-2014-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0407"
},
{
"name": "CVE-2013-5892",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5892"
},
{
"name": "CVE-2014-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0406"
},
{
"name": "CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
}
],
"initial_release_date": "2014-01-15T00:00:00",
"last_revision_date": "2014-01-15T00:00:00",
"links": [],
"reference": "CERTA-2014-AVI-032",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-01-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle VirtualBox et Apache Tomcat\u003c/span\u003e. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle VirtualBox et Apache Tomcat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2014 du 14 janvier 2014",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
}
]
}
ghsa-3p5r-7cw3-2m67
Vulnerability from github
java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "7.0.0"
},
{
"fixed": "7.0.40"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2013-2071"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": true,
"github_reviewed_at": "2022-07-08T19:07:33Z",
"nvd_published_at": "2013-06-01T14:21:00Z",
"severity": "LOW"
},
"details": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"id": "GHSA-3p5r-7cw3-2m67",
"modified": "2022-07-08T19:07:33Z",
"published": "2022-05-17T02:44:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2071"
},
{
"type": "WEB",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=54178"
},
{
"type": "WEB",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=139344248911289\u0026w=2"
},
{
"type": "WEB",
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372"
},
{
"type": "WEB",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1471372"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-1841-1"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat"
}
gsd-2013-2071
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2013-2071",
"description": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"id": "GSD-2013-2071",
"references": [
"https://www.suse.com/security/cve/CVE-2013-2071.html",
"https://www.debian.org/security/2014/dsa-2897",
"https://access.redhat.com/errata/RHSA-2013:1013",
"https://access.redhat.com/errata/RHSA-2013:1012",
"https://access.redhat.com/errata/RHSA-2013:1011",
"https://advisories.mageia.org/CVE-2013-2071.html",
"https://alas.aws.amazon.com/cve/html/CVE-2013-2071.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-2071"
],
"details": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"id": "GSD-2013-2071",
"modified": "2023-12-13T01:22:17.890500Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2071",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1471372",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1471372"
},
{
"name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372"
},
{
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=54178",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=54178"
},
{
"name": "FEDORA-2013-7999",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "FEDORA-2013-7979",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html"
},
{
"name": "20130510 CVE-2013-2071 Request mix-up if AsyncListener method throws RuntimeException",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html"
},
{
"name": "USN-1841-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1841-1"
},
{
"name": "59798",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59798"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "openSUSE-SU-2013:1306",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html"
},
{
"name": "FEDORA-2013-7993",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html"
},
{
"name": "HPSBMU02966",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=139344248911289\u0026w=2"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "[7.0.0,7.0.40)",
"affected_versions": "All versions starting from 7.0.0 before 7.0.40",
"cvss_v2": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-200",
"CWE-937"
],
"date": "2022-07-08",
"description": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.",
"fixed_versions": [
"7.0.40"
],
"identifier": "CVE-2013-2071",
"identifiers": [
"GHSA-3p5r-7cw3-2m67",
"CVE-2013-2071"
],
"not_impacted": "All versions before 7.0.0, all versions starting from 7.0.40",
"package_slug": "maven/org.apache.tomcat/tomcat",
"pubdate": "2022-05-17",
"solution": "Upgrade to version 7.0.40 or above.",
"title": "Exposure of Sensitive Information to an Unauthorized Actor",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2013-2071",
"https://issues.apache.org/bugzilla/show_bug.cgi?id=54178",
"http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html",
"http://marc.info/?l=bugtraq\u0026m=139344248911289\u0026w=2",
"http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372",
"http://svn.apache.org/viewvc?view=revision\u0026revision=1471372",
"http://tomcat.apache.org/security-7.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.ubuntu.com/usn/USN-1841-1",
"https://github.com/advisories/GHSA-3p5r-7cw3-2m67"
],
"uuid": "170ded3c-f6eb-40d3-bcf8-2bae7d3d532a"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2071"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1471372",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1471372"
},
{
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=54178",
"refsource": "CONFIRM",
"tags": [
"Exploit"
],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=54178"
},
{
"name": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372\u0026r2=1471371\u0026pathrev=1471372"
},
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "USN-1841-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-1841-1"
},
{
"name": "openSUSE-SU-2013:1306",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html"
},
{
"name": "FEDORA-2013-7979",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html"
},
{
"name": "FEDORA-2013-7999",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html"
},
{
"name": "FEDORA-2013-7993",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html"
},
{
"name": "20130510 CVE-2013-2071 Request mix-up if AsyncListener method throws RuntimeException",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html"
},
{
"name": "64758",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "HPSBMU02966",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=139344248911289\u0026w=2"
},
{
"name": "59798",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/59798"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-05-23T01:29Z",
"publishedDate": "2013-06-01T14:21Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.