[RHSA-2014:0216-01] Important: XStream security update

bugzilla at redhat.com bugzilla at redhat.com
Wed Feb 26 20:38:42 UTC 2014

Hash: SHA1

                   Red Hat Security Advisory

Synopsis:          Important: XStream security update
Advisory ID:       RHSA-2014:0216-01
Product:           Red Hat JBoss Fuse Service Works
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2014-0216.html
Issue date:        2014-02-26
CVE Names:         CVE-2013-7285 

1. Summary:

An update for the XStream component that fixes one security issue is
now available from the Red Hat Customer Portal for Red Hat JBoss Fuse
Service Works 6.0.0.

The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
score, which gives detailed severity rating, is available from the CVE link
in the References section.

2. Description:

XStream is a simple library to serialize and de-serialize objects to and
from XML.

It was found that XStream could deserialize arbitrary user-supplied XML
content, representing objects of any type. A remote attacker able to pass
XML to XStream could use this flaw to perform a variety of attacks,
including remote code execution in the context of the server running the
XStream application. (CVE-2013-7285)

All users of Red Hat JBoss Fuse Service Works 6.0.0 as provided from the
Red Hat Customer Portal are advised to apply this update.

3. Solution:

The References section of this erratum contains a download link (you must
log in to download the updates). Before applying the updates, back up your
existing installation, including all applications, configuration files,
databases and database settings, and so on.

It is recommended to halt the server by stopping the JBoss Application
Server process before installing this update, and then after installing the
update, restart the server by starting the JBoss Application
Server process.

4. Bugs fixed (https://bugzilla.redhat.com/):

1051277 - CVE-2013-7285 XStream: remote code execution due to insecure XML deserialization

5. References:


6. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc.
Version: GnuPG v1.4.4 (GNU/Linux)


More information about the Jboss-watch-list mailing list