Sicherheit: Mehrere Probleme in Red Hat JBoss Enterprise Application Platform
||Mehrere Probleme in Red Hat JBoss Enterprise Application Platform
||Red Hat JBoss Enterprise Application Platform
||Mo, 5. Februar 2018, 11:58
-----BEGIN PGP SIGNED MESSAGE-----
Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Enterprise Application Platform
6.4.18 security update
Advisory ID: RHSA-2018:0269-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2018:0269
Issue date: 2018-02-05
CVE Names: CVE-2017-12174 CVE-2017-12617 CVE-2018-1041
An update is now available for Red Hat JBoss Enterprise Application
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.
This release of Red Hat JBoss Enterprise Application Platform 6.4.19 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.18,
and includes bug fixes and enhancements, which are documented in the
Release Notes document linked to in the References.
* It was found that when Artemis and HornetQ are configured with UDP
discovery and JGroups discovery a huge byte array is created when receiving
an unexpected multicast message. This may result in a heap memory
exhaustion, full GC, or OutOfMemoryError. (CVE-2017-12174)
* A vulnerability was discovered in Tomcat where if a servlet context was
configured with readonly=false and HTTP PUT requests were allowed, an
attacker could upload a JSP file to that context and achieve code
* A vulnerability was found in the way RemoteMessageChannel, introduced in
jboss-remoting versions 3.3.10.Final-redhat-1, reads from an empty buffer.
An attacker could use this flaw to cause denial of service via high CPU
caused by an infinite loop. (CVE-2018-1041)
The CVE-2017-12174 issue was discovered by Masafumi Miura (Red Hat).
Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.
The References section of this erratum contains a download link (you must
log in to download the update).
4. Bugs fixed (https://bugzilla.redhat.com/):
1494283 - CVE-2017-12617 tomcat: Remote Code Execution bypass for
1498378 - CVE-2017-12174 artemis/hornetq: memory exhaustion via UDP and JGroups
1530457 - CVE-2018-1041 jboss-remoting: High CPU Denial of Service
The Red Hat security contact is <email@example.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
-----END PGP SIGNATURE-----
RHSA-announce mailing list