Action not permitted
Modal body text goes here.
cve-2015-1796
Vulnerability from cvelistv5
Published
2015-07-08 15:00
Modified
2024-08-06 04:54
Severity ?
EPSS score ?
Summary
The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:54:16.257Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2015:1176", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1176.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://shibboleth.net/community/advisories/secadv_20150225.txt" }, { "name": "RHSA-2015:1177", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1177.html" }, { "name": "75370", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75370" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-28T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2015:1176", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1176.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://shibboleth.net/community/advisories/secadv_20150225.txt" }, { "name": "RHSA-2015:1177", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1177.html" }, { "name": "75370", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75370" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-1796", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2015:1176", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1176.html" }, { "name": "https://shibboleth.net/community/advisories/secadv_20150225.txt", "refsource": "CONFIRM", "url": "https://shibboleth.net/community/advisories/secadv_20150225.txt" }, { "name": "RHSA-2015:1177", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1177.html" }, { "name": "75370", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75370" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-1796", "datePublished": "2015-07-08T15:00:00", "dateReserved": "2015-02-17T00:00:00", "dateUpdated": "2024-08-06T04:54:16.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-1796\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-07-08T15:59:02.897\",\"lastModified\":\"2024-11-21T02:26:09.880\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor.\"},{\"lang\":\"es\",\"value\":\"Los motores de confianza PKIX en Shibboleth Identity Provider anterior a 2.4.4 y OpenSAML Java (OpenSAML-J) anterior a 2.6.5 conf\u00edan en los certificados X.509 de candidatos cuando nombres no confiables est\u00e1n disponibles para el identificador de entidad, lo que permite a atacantes remotos suplantar una entidad a trav\u00e9s de un certificado emitido por una ancla de confianza shibmd:KeyAuthority.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-254\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:shibboleth:identity_provider:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4.3\",\"matchCriteriaId\":\"55BF0DB9-3D2D-4211-A889-EEBF781B0FDB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:shibboleth:opensaml_java:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.4\",\"matchCriteriaId\":\"06CC5F7F-A65B-4779-84C5-3E2CFA5B56FE\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1176.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1177.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/75370\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://shibboleth.net/community/advisories/secadv_20150225.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1176.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1177.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/75370\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://shibboleth.net/community/advisories/secadv_20150225.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
rhsa-2015_1177
Vulnerability from csaf_redhat
Published
2015-06-23 16:52
Modified
2024-11-22 09:16
Summary
Red Hat Security Advisory: Red Hat JBoss A-MQ 6.2.0 update
Notes
Topic
Red Hat JBoss A-MQ 6.2.0, which fixes multiple security issues, several
bugs, and adds various enhancements, is now available from the Red Hat
Customer Portal.
Red Hat Product Security has rated this update as having Important
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards-compliant
messaging system that is tailored for use in mission critical applications.
Red Hat JBoss A-MQ 6.2.0 is a minor product release that updates Red Hat
JBoss A-MQ 6.1.0 and includes several bug fixes and enhancements. Refer to
the Release Notes document, available from the link in the References
section, for a list of changes.
The following security issues are resolved with this update:
It was found that the fix for CVE-2012-6153 was incomplete: the code added to check that the server hostname matches the domain name in a subject's Common Name (CN) field in X.509 certificates was flawed. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. (CVE-2014-3577)
It was found that JBoss Fuse would allow any user defined in the users.properties file to access the HawtIO console without having a valid admin role. This could allow a remote attacker to bypass intended authentication HawtIO console access restrictions. (CVE-2014-8175)
It was found that a prior countermeasure in Apache WSS4J for Bleichenbacher's attack on XML Encryption (CVE-2011-2487) threw an exception that permitted an attacker to determine the failure of the attempted attack, thereby leaving WSS4J vulnerable to the attack. The original flaw allowed a remote attacker to recover the entire plain text form of a symmetric key. (CVE-2015-0226)
It was found that Apache WSS4J permitted bypass of the requireSignedEncryptedDataElements configuration property via XML Signature wrapping attacks. A remote attacker could use this flaw to modify the contents of a signed request. (CVE-2015-0227)
It was found that PKIX trust components allowed an X509 credential to be trusted if no trusted names were available for the entityID. An attacker could use a certificate issued by a shibmd:KeyAuthority trust anchor to impersonate an entity within the scope of that keyAuthority. (CVE-2015-1796)
The CVE-2014-8175 issue was reported by Jay Kumar SenSharma of Red Hat.
All users of Red Hat JBoss A-MQ 6.1.0 as provided from the Red Hat Customer
Portal are advised to apply this update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss A-MQ 6.2.0, which fixes multiple security issues, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards-compliant\nmessaging system that is tailored for use in mission critical applications.\n\nRed Hat JBoss A-MQ 6.2.0 is a minor product release that updates Red Hat\nJBoss A-MQ 6.1.0 and includes several bug fixes and enhancements. Refer to\nthe Release Notes document, available from the link in the References\nsection, for a list of changes.\n\nThe following security issues are resolved with this update:\n\nIt was found that the fix for CVE-2012-6153 was incomplete: the code added to check that the server hostname matches the domain name in a subject\u0027s Common Name (CN) field in X.509 certificates was flawed. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. (CVE-2014-3577)\n\nIt was found that JBoss Fuse would allow any user defined in the users.properties file to access the HawtIO console without having a valid admin role. This could allow a remote attacker to bypass intended authentication HawtIO console access restrictions. (CVE-2014-8175)\n\nIt was found that a prior countermeasure in Apache WSS4J for Bleichenbacher\u0027s attack on XML Encryption (CVE-2011-2487) threw an exception that permitted an attacker to determine the failure of the attempted attack, thereby leaving WSS4J vulnerable to the attack. The original flaw allowed a remote attacker to recover the entire plain text form of a symmetric key. (CVE-2015-0226)\n\nIt was found that Apache WSS4J permitted bypass of the requireSignedEncryptedDataElements configuration property via XML Signature wrapping attacks. A remote attacker could use this flaw to modify the contents of a signed request. (CVE-2015-0227)\n\nIt was found that PKIX trust components allowed an X509 credential to be trusted if no trusted names were available for the entityID. An attacker could use a certificate issued by a shibmd:KeyAuthority trust anchor to impersonate an entity within the scope of that keyAuthority. (CVE-2015-1796)\n\nThe CVE-2014-8175 issue was reported by Jay Kumar SenSharma of Red Hat.\n\nAll users of Red Hat JBoss A-MQ 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1177", "url": "https://access.redhat.com/errata/RHSA-2015:1177" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq\u0026downloadType=distributions\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq\u0026downloadType=distributions\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_A-MQ/", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_A-MQ/" }, { "category": "external", "summary": "1129074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129074" }, { "category": "external", "summary": "1191446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191446" }, { "category": "external", "summary": "1191451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191451" }, { "category": "external", "summary": "1196619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196619" }, { "category": "external", "summary": "1205112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205112" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1177.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss A-MQ 6.2.0 update", "tracking": { "current_release_date": "2024-11-22T09:16:09+00:00", "generator": { "date": "2024-11-22T09:16:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1177", "initial_release_date": "2015-06-23T16:52:10+00:00", "revision_history": [ { "date": "2015-06-23T16:52:10+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:35:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:16:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss A-MQ 6.2", "product": { "name": "Red Hat JBoss A-MQ 6.2", "product_id": "Red Hat JBoss A-MQ 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_amq:6.2.0" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3577", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "discovery_date": "2014-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1129074" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2012-6153 was incomplete: the code added to check that the server hostname matches the domain name in a subject\u0027s Common Name (CN) field in X.509 certificates was flawed. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix", "title": "Vulnerability summary" }, { "category": "other", "text": "Additional information can be found in the Red Hat Knowledgebase article: https://access.redhat.com/solutions/1165533\n\nThis issue affects the versions of HttpComponents Client as shipped with Red Hat JBoss Data Grid 6 and Red Hat JBoss Data Virtualization 6; and ModeShape Client as shipped with Red Hat JBoss Data Virtualization 6. However, this flaw is not known to be exploitable under any supported scenario in Red Hat JBoss Data Grid 6 and JBoss Data Virtualization 6. A future update may address this issue.\n\nRed Hat JBoss Enterprise Application Platform 4, Red Hat JBoss SOA Platform 4, and Red Hat JBoss Web Server 1 are now in Phase 3, Extended Life Support, of their respective life cycles. This issue has been rated as having Important security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/\n\nFuse ESB 4, Fuse Message Broker 5.2, 5.3, 5.4 and Fuse Services Framework 2.3, 2.4 are now in a reduced support phase receiving only Critical impact security fixes. This issue has been rated as having Important security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Fuse Product Life Cycle: https://access.redhat.com/support/policy/updates/fusesource/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss A-MQ 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3577" }, { "category": "external", "summary": "RHBZ#1129074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3577", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3577" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3577", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3577" } ], "release_date": "2014-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:10+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss A-MQ 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1177" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss A-MQ 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix" }, { "acknowledgments": [ { "names": [ "Jay Kumar SenSharma" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-8175", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2015-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1205112" } ], "notes": [ { "category": "description", "text": "It was found that JBoss Fuse would allow any user defined in the users.properties file to access the HawtIO console without having a valid admin role. This could allow a remote attacker to bypass intended authentication HawtIO console access restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "Fuse: insufficient access permissions checks when accessing Hawtio console", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss A-MQ 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8175" }, { "category": "external", "summary": "RHBZ#1205112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8175", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8175" } ], "release_date": "2015-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:10+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss A-MQ 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1177" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss A-MQ 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Fuse: insufficient access permissions checks when accessing Hawtio console" }, { "cve": "CVE-2015-0226", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2015-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1191446" } ], "notes": [ { "category": "description", "text": "It was found that a prior countermeasure in Apache WSS4J for Bleichenbacher\u0027s attack on XML Encryption (CVE-2011-2487) threw an exception that permitted an attacker to determine the failure of the attempted attack, thereby leaving WSS4J vulnerable to the attack. The original flaw allowed a remote attacker to recover the entire plain text form of a symmetric key.", "title": "Vulnerability description" }, { "category": "summary", "text": "wss4j: Apache WSS4J is vulnerable to Bleichenbacher\u0027s attack (incomplete fix for CVE-2011-2487)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss A-MQ 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0226" }, { "category": "external", "summary": "RHBZ#1191446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191446" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0226", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0226" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0226", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0226" } ], "release_date": "2015-02-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:10+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss A-MQ 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1177" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss A-MQ 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wss4j: Apache WSS4J is vulnerable to Bleichenbacher\u0027s attack (incomplete fix for CVE-2011-2487)" }, { "cve": "CVE-2015-0227", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2015-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1191451" } ], "notes": [ { "category": "description", "text": "It was found that Apache WSS4J permitted bypass of the requireSignedEncryptedDataElements configuration property via XML Signature wrapping attacks. A remote attacker could use this flaw to modify the contents of a signed request.", "title": "Vulnerability description" }, { "category": "summary", "text": "wss4j: Apache WSS4J doesn\u0027t correctly enforce the requireSignedEncryptedDataElements property", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss A-MQ 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0227" }, { "category": "external", "summary": "RHBZ#1191451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191451" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0227", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0227" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0227", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0227" } ], "release_date": "2015-02-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:10+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss A-MQ 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1177" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss A-MQ 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wss4j: Apache WSS4J doesn\u0027t correctly enforce the requireSignedEncryptedDataElements property" }, { "cve": "CVE-2015-1796", "discovery_date": "2015-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1196619" } ], "notes": [ { "category": "description", "text": "It was found that PKIX trust components allowed an X.509 credential to be trusted if no trusted names were available for the entityID. An attacker could use a certificate issued by a shibmd:KeyAuthority trust anchor to impersonate an entity within the scope of that keyAuthority.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java: PKIX Trust Engines Exhibit Critical Flaw In Trusted Names Evaluation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss A-MQ 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1796" }, { "category": "external", "summary": "RHBZ#1196619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1796", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1796" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1796", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1796" }, { "category": "external", "summary": "http://shibboleth.net/community/advisories/secadv_20150225.txt", "url": "http://shibboleth.net/community/advisories/secadv_20150225.txt" } ], "release_date": "2015-02-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:10+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss A-MQ 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1177" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 6.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss A-MQ 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Java: PKIX Trust Engines Exhibit Critical Flaw In Trusted Names Evaluation" } ] }
rhsa-2015_1176
Vulnerability from csaf_redhat
Published
2015-06-23 16:52
Modified
2024-11-22 09:16
Summary
Red Hat Security Advisory: Red Hat JBoss Fuse 6.2.0 update
Notes
Topic
Red Hat JBoss Fuse 6.2.0, which fixes multiple security issues, several
bugs, and adds various enhancements, is now available from the Red Hat
Customer Portal.
Red Hat Product Security has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Red Hat JBoss Fuse 6.2.0 is a minor product release that updates Red Hat
JBoss Fuse 6.1.0, and includes several bug fixes and enhancements. Refer to
the Release Notes document, available from the link in the References
section, for a list of changes.
Details
Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint,
flexible, open source enterprise service bus and integration platform.
The following security fixes are addressed in this release:
It was found that async-http-client would disable SSL/TLS certificate verification under certain conditions, for example if HTTPS communication also used client certificates. A man-in-the-middle (MITM) attacker could use this flaw to spoof a valid certificate. (CVE-2013-7397)
It was found that async-http-client did not verify that the server hostname matched the domain name in the subject's Common Name (CN) or subjectAltName field in X.509 certificates. This could allow a man-in-the-middle attacker to spoof an SSL server if they had a certificate that was valid for any domain name. (CVE-2013-7398)
It was found that the ServerTrustManager in the Smack XMPP API did not
verify basicConstraints and nameConstraints in X.509 certificate chains. A
man-in-the-middle attacker could use this flaw to spoof servers and obtain
sensitive information. (CVE-2014-0363)
It was found that the ParseRoster component in the Smack XMPP API did not
verify the From attribute of a roster-query IQ stanza. A remote attacker
could use this flaw to spoof IQ responses. (CVE-2014-0364)
It was found that the fix for CVE-2012-6153 was incomplete: the code added to check that the server hostname matches the domain name in a subject's Common Name (CN) field in X.509 certificates was flawed. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. (CVE-2014-3577)
It was found that the JClouds scriptbuilder Statements class writes a temporary file to a predictable location. An attacker could use this flaw to access sensitive data, denial of service, or other attacks. (CVE-2014-4651)
It was found that SSLSocket in Smack did not perform hostname verification. An attacker could redirect traffic between an application and an XMPP server by providing a valid certificate for a domain under the attacker's control. (CVE-2014-5075)
It was found that JBoss Fuse would allow any user defined in the users.properties file to access the HawtIO console without having a valid admin role. This could allow a remote attacker to bypass intended authentication HawtIO console access restrictions. (CVE-2014-8175)
It was found that a prior countermeasure in Apache WSS4J for Bleichenbacher's attack on XML Encryption (CVE-2011-2487) threw an exception that permitted an attacker to determine the failure of the attempted attack, thereby leaving WSS4J vulnerable to the attack. The original flaw allowed a remote attacker to recover the entire plain text form of a symmetric key. (CVE-2015-0226)
It was found that Apache WSS4J permitted bypass of the requireSignedEncryptedDataElements configuration property via XML Signature wrapping attacks. A remote attacker could use this flaw to modify the contents of a signed request. (CVE-2015-0227)
It was found that PKIX trust components allowed an X509 credential to be trusted if no trusted names were available for the entityID. An attacker could use a certificate issued by a shibmd:KeyAuthority trust anchor to impersonate an entity within the scope of that keyAuthority. (CVE-2015-1796)
The CVE-2014-8175 issue was reported by Jay Kumar SenSharma of Red Hat.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Fuse 6.2.0, which fixes multiple security issues, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nRed Hat JBoss Fuse 6.2.0 is a minor product release that updates Red Hat\nJBoss Fuse 6.1.0, and includes several bug fixes and enhancements. Refer to\nthe Release Notes document, available from the link in the References\nsection, for a list of changes.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint,\nflexible, open source enterprise service bus and integration platform.\n\nThe following security fixes are addressed in this release:\n\nIt was found that async-http-client would disable SSL/TLS certificate verification under certain conditions, for example if HTTPS communication also used client certificates. A man-in-the-middle (MITM) attacker could use this flaw to spoof a valid certificate. (CVE-2013-7397)\n\nIt was found that async-http-client did not verify that the server hostname matched the domain name in the subject\u0027s Common Name (CN) or subjectAltName field in X.509 certificates. This could allow a man-in-the-middle attacker to spoof an SSL server if they had a certificate that was valid for any domain name. (CVE-2013-7398)\n\nIt was found that the ServerTrustManager in the Smack XMPP API did not\nverify basicConstraints and nameConstraints in X.509 certificate chains. A\nman-in-the-middle attacker could use this flaw to spoof servers and obtain\nsensitive information. (CVE-2014-0363)\n\nIt was found that the ParseRoster component in the Smack XMPP API did not\nverify the From attribute of a roster-query IQ stanza. A remote attacker\ncould use this flaw to spoof IQ responses. (CVE-2014-0364)\n\nIt was found that the fix for CVE-2012-6153 was incomplete: the code added to check that the server hostname matches the domain name in a subject\u0027s Common Name (CN) field in X.509 certificates was flawed. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. (CVE-2014-3577)\n\nIt was found that the JClouds scriptbuilder Statements class writes a temporary file to a predictable location. An attacker could use this flaw to access sensitive data, denial of service, or other attacks. (CVE-2014-4651)\n\nIt was found that SSLSocket in Smack did not perform hostname verification. An attacker could redirect traffic between an application and an XMPP server by providing a valid certificate for a domain under the attacker\u0027s control. (CVE-2014-5075)\n\nIt was found that JBoss Fuse would allow any user defined in the users.properties file to access the HawtIO console without having a valid admin role. This could allow a remote attacker to bypass intended authentication HawtIO console access restrictions. (CVE-2014-8175)\n\nIt was found that a prior countermeasure in Apache WSS4J for Bleichenbacher\u0027s attack on XML Encryption (CVE-2011-2487) threw an exception that permitted an attacker to determine the failure of the attempted attack, thereby leaving WSS4J vulnerable to the attack. The original flaw allowed a remote attacker to recover the entire plain text form of a symmetric key. (CVE-2015-0226)\n\nIt was found that Apache WSS4J permitted bypass of the requireSignedEncryptedDataElements configuration property via XML Signature wrapping attacks. A remote attacker could use this flaw to modify the contents of a signed request. (CVE-2015-0227)\n\nIt was found that PKIX trust components allowed an X509 credential to be trusted if no trusted names were available for the entityID. An attacker could use a certificate issued by a shibmd:KeyAuthority trust anchor to impersonate an entity within the scope of that keyAuthority. (CVE-2015-1796)\n\nThe CVE-2014-8175 issue was reported by Jay Kumar SenSharma of Red Hat.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1176", "url": "https://access.redhat.com/errata/RHSA-2015:1176" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_Fuse/", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_Fuse/" }, { "category": "external", "summary": "1093273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1093273" }, { "category": "external", "summary": "1093276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1093276" }, { "category": "external", "summary": "1112877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112877" }, { "category": "external", "summary": "1127276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1127276" }, { "category": "external", "summary": "1129074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129074" }, { "category": "external", "summary": "1133769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1133769" }, { "category": "external", "summary": "1133773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1133773" }, { "category": "external", "summary": "1191446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191446" }, { "category": "external", "summary": "1191451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191451" }, { "category": "external", "summary": "1196619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196619" }, { "category": "external", "summary": "1205112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205112" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1176.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Fuse 6.2.0 update", "tracking": { "current_release_date": "2024-11-22T09:16:04+00:00", "generator": { "date": "2024-11-22T09:16:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1176", "initial_release_date": "2015-06-23T16:52:52+00:00", "revision_history": [ { "date": "2015-06-23T16:52:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:35:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:16:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Fuse 6.2", "product": { "name": "Red Hat JBoss Fuse 6.2", "product_id": "Red Hat JBoss Fuse 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:6.2.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7397", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2014-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1133769" } ], "notes": [ { "category": "description", "text": "It was found that async-http-client would disable SSL/TLS certificate verification under certain conditions, for example if HTTPS communication also used client certificates. A man-in-the-middle (MITM) attacker could use this flaw to spoof a valid certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "async-http-client: SSL/TLS certificate verification is disabled under certain conditions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-7397" }, { "category": "external", "summary": "RHBZ#1133769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1133769" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-7397", "url": "https://www.cve.org/CVERecord?id=CVE-2013-7397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-7397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7397" } ], "release_date": "2013-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:52+00:00", "details": "All users of Red Hat JBoss Fuse 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "async-http-client: SSL/TLS certificate verification is disabled under certain conditions" }, { "cve": "CVE-2013-7398", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "discovery_date": "2014-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1133773" } ], "notes": [ { "category": "description", "text": "It was found that async-http-client did not verify that the server hostname matched the domain name in the subject\u0027s Common Name (CN) or subjectAltName field in X.509 certificates. This could allow a man-in-the-middle attacker to spoof an SSL server if they had a certificate that was valid for any domain name.", "title": "Vulnerability description" }, { "category": "summary", "text": "async-http-client: missing hostname verification for SSL certificates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-7398" }, { "category": "external", "summary": "RHBZ#1133773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1133773" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-7398", "url": "https://www.cve.org/CVERecord?id=CVE-2013-7398" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-7398", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7398" } ], "release_date": "2013-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:52+00:00", "details": "All users of Red Hat JBoss Fuse 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "async-http-client: missing hostname verification for SSL certificates" }, { "cve": "CVE-2014-0363", "discovery_date": "2014-04-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1093273" } ], "notes": [ { "category": "description", "text": "It was found that the ServerTrustManager in the Smack XMPP API did not verify basicConstraints and nameConstraints in X.509 certificate chains. A man-in-the-middle attacker could use this flaw to spoof servers and obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "smack: incorrect X.509 certificate validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0363" }, { "category": "external", "summary": "RHBZ#1093273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1093273" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0363", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0363" } ], "release_date": "2013-02-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:52+00:00", "details": "All users of Red Hat JBoss Fuse 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "smack: incorrect X.509 certificate validation" }, { "cve": "CVE-2014-0364", "discovery_date": "2014-04-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1093276" } ], "notes": [ { "category": "description", "text": "It was found that the ParseRoster component in the Smack XMPP API did not verify the From attribute of a roster-query IQ stanza. A remote attacker could use this flaw to spoof IQ responses.", "title": "Vulnerability description" }, { "category": "summary", "text": "smack: IQ response spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0364" }, { "category": "external", "summary": "RHBZ#1093276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1093276" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0364", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0364" } ], "release_date": "2014-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:52+00:00", "details": "All users of Red Hat JBoss Fuse 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "smack: IQ response spoofing" }, { "cve": "CVE-2014-3577", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "discovery_date": "2014-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1129074" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2012-6153 was incomplete: the code added to check that the server hostname matches the domain name in a subject\u0027s Common Name (CN) field in X.509 certificates was flawed. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix", "title": "Vulnerability summary" }, { "category": "other", "text": "Additional information can be found in the Red Hat Knowledgebase article: https://access.redhat.com/solutions/1165533\n\nThis issue affects the versions of HttpComponents Client as shipped with Red Hat JBoss Data Grid 6 and Red Hat JBoss Data Virtualization 6; and ModeShape Client as shipped with Red Hat JBoss Data Virtualization 6. However, this flaw is not known to be exploitable under any supported scenario in Red Hat JBoss Data Grid 6 and JBoss Data Virtualization 6. A future update may address this issue.\n\nRed Hat JBoss Enterprise Application Platform 4, Red Hat JBoss SOA Platform 4, and Red Hat JBoss Web Server 1 are now in Phase 3, Extended Life Support, of their respective life cycles. This issue has been rated as having Important security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/\n\nFuse ESB 4, Fuse Message Broker 5.2, 5.3, 5.4 and Fuse Services Framework 2.3, 2.4 are now in a reduced support phase receiving only Critical impact security fixes. This issue has been rated as having Important security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Fuse Product Life Cycle: https://access.redhat.com/support/policy/updates/fusesource/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3577" }, { "category": "external", "summary": "RHBZ#1129074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3577", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3577" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3577", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3577" } ], "release_date": "2014-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:52+00:00", "details": "All users of Red Hat JBoss Fuse 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix" }, { "cve": "CVE-2014-4651", "discovery_date": "2014-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1112877" } ], "notes": [ { "category": "description", "text": "It was found that the JClouds scriptbuilder Statements class wrote a temporary file to a predictable location. An attacker could use this flaw to access sensitive data, cause a denial of service, or perform other attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "JClouds: predictable tmp file creation in ScriptBuilder Statements", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-4651" }, { "category": "external", "summary": "RHBZ#1112877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-4651", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4651" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4651", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4651" } ], "release_date": "2014-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:52+00:00", "details": "All users of Red Hat JBoss Fuse 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JClouds: predictable tmp file creation in ScriptBuilder Statements" }, { "cve": "CVE-2014-5075", "discovery_date": "2014-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1127276" } ], "notes": [ { "category": "description", "text": "It was found that SSLSocket in Smack did not perform hostname verification. An attacker could redirect traffic between an application and an XMPP server by providing a valid certificate for a domain under the attacker\u0027s control.", "title": "Vulnerability description" }, { "category": "summary", "text": "smack: MitM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-5075" }, { "category": "external", "summary": "RHBZ#1127276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1127276" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-5075", "url": "https://www.cve.org/CVERecord?id=CVE-2014-5075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-5075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5075" } ], "release_date": "2014-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:52+00:00", "details": "All users of Red Hat JBoss Fuse 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "smack: MitM vulnerability" }, { "acknowledgments": [ { "names": [ "Jay Kumar SenSharma" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-8175", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2015-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1205112" } ], "notes": [ { "category": "description", "text": "It was found that JBoss Fuse would allow any user defined in the users.properties file to access the HawtIO console without having a valid admin role. This could allow a remote attacker to bypass intended authentication HawtIO console access restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "Fuse: insufficient access permissions checks when accessing Hawtio console", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8175" }, { "category": "external", "summary": "RHBZ#1205112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8175", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8175" } ], "release_date": "2015-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:52+00:00", "details": "All users of Red Hat JBoss Fuse 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Fuse: insufficient access permissions checks when accessing Hawtio console" }, { "cve": "CVE-2015-0226", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2015-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1191446" } ], "notes": [ { "category": "description", "text": "It was found that a prior countermeasure in Apache WSS4J for Bleichenbacher\u0027s attack on XML Encryption (CVE-2011-2487) threw an exception that permitted an attacker to determine the failure of the attempted attack, thereby leaving WSS4J vulnerable to the attack. The original flaw allowed a remote attacker to recover the entire plain text form of a symmetric key.", "title": "Vulnerability description" }, { "category": "summary", "text": "wss4j: Apache WSS4J is vulnerable to Bleichenbacher\u0027s attack (incomplete fix for CVE-2011-2487)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0226" }, { "category": "external", "summary": "RHBZ#1191446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191446" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0226", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0226" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0226", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0226" } ], "release_date": "2015-02-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:52+00:00", "details": "All users of Red Hat JBoss Fuse 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wss4j: Apache WSS4J is vulnerable to Bleichenbacher\u0027s attack (incomplete fix for CVE-2011-2487)" }, { "cve": "CVE-2015-0227", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2015-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1191451" } ], "notes": [ { "category": "description", "text": "It was found that Apache WSS4J permitted bypass of the requireSignedEncryptedDataElements configuration property via XML Signature wrapping attacks. A remote attacker could use this flaw to modify the contents of a signed request.", "title": "Vulnerability description" }, { "category": "summary", "text": "wss4j: Apache WSS4J doesn\u0027t correctly enforce the requireSignedEncryptedDataElements property", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0227" }, { "category": "external", "summary": "RHBZ#1191451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191451" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0227", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0227" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0227", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0227" } ], "release_date": "2015-02-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:52+00:00", "details": "All users of Red Hat JBoss Fuse 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wss4j: Apache WSS4J doesn\u0027t correctly enforce the requireSignedEncryptedDataElements property" }, { "cve": "CVE-2015-1796", "discovery_date": "2015-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1196619" } ], "notes": [ { "category": "description", "text": "It was found that PKIX trust components allowed an X.509 credential to be trusted if no trusted names were available for the entityID. An attacker could use a certificate issued by a shibmd:KeyAuthority trust anchor to impersonate an entity within the scope of that keyAuthority.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java: PKIX Trust Engines Exhibit Critical Flaw In Trusted Names Evaluation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1796" }, { "category": "external", "summary": "RHBZ#1196619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1796", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1796" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1796", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1796" }, { "category": "external", "summary": "http://shibboleth.net/community/advisories/secadv_20150225.txt", "url": "http://shibboleth.net/community/advisories/secadv_20150225.txt" } ], "release_date": "2015-02-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:52+00:00", "details": "All users of Red Hat JBoss Fuse 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1176" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 6.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Java: PKIX Trust Engines Exhibit Critical Flaw In Trusted Names Evaluation" }, { "cve": "CVE-2016-3088", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2016-05-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1339318" } ], "notes": [ { "category": "description", "text": "The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Fileserver web application vulnerability allowing RCE", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat JBoss A-MQ 6.3 , Red Hat JBoss Fuse 6.3, and Red Hat JBoss Fuse Service Works 6.0.0 do not provide the vulnerable component and are not affected by this flaw. Red Hat JBoss A-MQ 6.2.1 and Red Hat JBoss Fuse 6.2.1 disable the vulnerable component and as such are not vulnerable to this flaw. The fileserver component was first disabled in A-MQ 6.2.0 and Fuse 6.2.0. Users of older, unsupported versions of these products are strongly advised to observe the mitigation provided on this page.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3088" }, { "category": "external", "summary": "RHBZ#1339318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1339318" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3088", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3088" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3088", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3088" }, { "category": "external", "summary": "http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt", "url": "http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-05-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-23T16:52:52+00:00", "details": "All users of Red Hat JBoss Fuse 6.1.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1176" }, { "category": "workaround", "details": "Users are advised to use other FTP and HTTP based file servers for transferring blob messages. Fileserver web application SHOULD NOT be used in older version of the broker and it should be disabled (it has been disabled by default since 5.12.0). This can be done by removing (commenting out) the following lines from conf\\jetty.xml file\n\n\u003cbean class=\"org.eclipse.jetty.webapp.WebAppContext\"\u003e\n \u003cproperty name=\"contextPath\" value=\"/fileserver\" /\u003e\n \u003cproperty name=\"resourceBase\" value=\"${activemq.home}/webapps/fileserver\" /\u003e\n \u003cproperty name=\"logUrlOnStart\" value=\"true\" /\u003e\n \u003cproperty name=\"parentLoaderPriority\" value=\"true\" /\u003e\n\u003c/bean\u003e", "product_ids": [ "Red Hat JBoss Fuse 6.2" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-02-10T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "activemq: Fileserver web application vulnerability allowing RCE" } ] }
gsd-2015-1796
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-1796", "description": "The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor.", "id": "GSD-2015-1796", "references": [ "https://www.suse.com/security/cve/CVE-2015-1796.html", "https://access.redhat.com/errata/RHSA-2015:1177", "https://access.redhat.com/errata/RHSA-2015:1176" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-1796" ], "details": "The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor.", "id": "GSD-2015-1796", "modified": "2023-12-13T01:20:04.991116Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-1796", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2015:1176", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1176.html" }, { "name": "https://shibboleth.net/community/advisories/secadv_20150225.txt", "refsource": "CONFIRM", "url": "https://shibboleth.net/community/advisories/secadv_20150225.txt" }, { "name": "RHSA-2015:1177", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1177.html" }, { "name": "75370", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75370" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "(,2.4.3]", "affected_versions": "All versions up to 2.4.3", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "cwe_ids": [ "CWE-1035", "CWE-254", "CWE-937" ], "date": "2022-07-06", "description": "The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor.", "fixed_versions": [ "2.4.4" ], "identifier": "CVE-2015-1796", "identifiers": [ "GHSA-78fq-w796-q537", "CVE-2015-1796" ], "not_impacted": "All versions after 2.4.3", "package_slug": "maven/edu.internet2.middleware/shibboleth-identityprovider", "pubdate": "2022-05-17", "solution": "Upgrade to version 2.4.4 or above.", "title": "Improper Certificate Validation in Shibboleth Identity Provider and OpenSAML", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2015-1796", "https://shibboleth.net/community/advisories/secadv_20150225.txt", "http://rhn.redhat.com/errata/RHSA-2015-1176.html", "http://rhn.redhat.com/errata/RHSA-2015-1177.html", "https://github.com/advisories/GHSA-78fq-w796-q537" ], "uuid": "5bbde918-3416-4ba3-954a-cc44c3cb11f8" }, { "affected_range": "(,2.6.4]", "affected_versions": "All versions up to 2.6.4", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "cwe_ids": [ "CWE-1035", "CWE-254", "CWE-937" ], "date": "2022-07-06", "description": "The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor.", "fixed_versions": [ "2.6.5" ], "identifier": "CVE-2015-1796", "identifiers": [ "GHSA-78fq-w796-q537", "CVE-2015-1796" ], "not_impacted": "All versions after 2.6.4", "package_slug": "maven/org.opensaml/opensaml", "pubdate": "2022-05-17", "solution": "Upgrade to version 2.6.5 or above.", "title": "Improper Certificate Validation in Shibboleth Identity Provider and OpenSAML", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2015-1796", "https://shibboleth.net/community/advisories/secadv_20150225.txt", "http://rhn.redhat.com/errata/RHSA-2015-1176.html", "http://rhn.redhat.com/errata/RHSA-2015-1177.html", "https://github.com/advisories/GHSA-78fq-w796-q537" ], "uuid": "84b5e9e5-3c3e-4341-b5dd-5bb04a2b8549" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:shibboleth:identity_provider:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.4.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:shibboleth:opensaml_java:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.4", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-1796" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-254" } ] } ] }, "references": { "reference_data": [ { "name": "https://shibboleth.net/community/advisories/secadv_20150225.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://shibboleth.net/community/advisories/secadv_20150225.txt" }, { "name": "RHSA-2015:1177", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1177.html" }, { "name": "RHSA-2015:1176", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1176.html" }, { "name": "75370", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/75370" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2016-11-30T02:59Z", "publishedDate": "2015-07-08T15:59Z" } } }
ghsa-78fq-w796-q537
Vulnerability from github
Published
2022-05-17 03:38
Modified
2022-07-06 20:25
Summary
Improper Certificate Validation in Shibboleth Identity Provider and OpenSAML
Details
The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 2.6.4" }, "package": { "ecosystem": "Maven", "name": "org.opensaml:opensaml" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.6.5" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 2.4.3" }, "package": { "ecosystem": "Maven", "name": "edu.internet2.middleware:shibboleth-identityprovider" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.4.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2015-1796" ], "database_specific": { "cwe_ids": [ "CWE-295" ], "github_reviewed": true, "github_reviewed_at": "2022-07-06T20:25:31Z", "nvd_published_at": "2015-07-08T15:59:00Z", "severity": "MODERATE" }, "details": "The PKIX trust engines in Shibboleth Identity Provider before 2.4.4 and OpenSAML Java (OpenSAML-J) before 2.6.5 trust candidate X.509 credentials when no trusted names are available for the entityID, which allows remote attackers to impersonate an entity via a certificate issued by a shibmd:KeyAuthority trust anchor.", "id": "GHSA-78fq-w796-q537", "modified": "2022-07-06T20:25:31Z", "published": "2022-05-17T03:38:17Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1796" }, { "type": "WEB", "url": "https://shibboleth.net/community/advisories/secadv_20150225.txt" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1176.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1177.html" } ], "schema_version": "1.4.0", "severity": [], "summary": "Improper Certificate Validation in Shibboleth Identity Provider and OpenSAML" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.