[RHSA-2014:0294-01] Important: XStream security update

bugzilla at redhat.com bugzilla at redhat.com
Thu Mar 13 19:33:44 UTC 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: XStream security update
Advisory ID:       RHSA-2014:0294-01
Product:           Red Hat JBoss Data Virtualization
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2014-0294.html
Issue date:        2014-03-13
CVE Names:         CVE-2013-7285 
=====================================================================

1. Summary:

An update for the XStream component that fixes one security issue is now
available from the Red Hat Customer Portal for Red Hat JBoss Data
Virtualization 6.0.0.

The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
score, which gives detailed severity rating, is available from the CVE link
in the References section.

2. Description:

XStream is a simple library to serialize and de-serialize objects to and
from XML.

It was found that XStream could deserialize arbitrary user-supplied XML
content, representing objects of any type. A remote attacker able to pass
XML to XStream could use this flaw to perform a variety of attacks,
including remote code execution in the context of the server running the
XStream application. (CVE-2013-7285)

The main distribution of Red Hat JBoss Data Virtualization 6.0.0 does not
contain the vulnerable XStream library and is not vulnerable to
CVE-2013-7285. Only users of Red Hat JBoss Data Virtualization 6.0.0 who
installed an optional S-RAMP distribution as provided from the Red Hat
Customer Portal are advised to apply this update.

3. Solution:

The References section of this erratum contains a download link (you must
log in to download the updates). Before applying the updates, back up your
existing installation, including all applications, configuration files,
databases and database settings, and so on.

It is recommended to halt the server by stopping the JBoss Application
Server process before installing this update, and then after installing the
update, restart the server by starting the JBoss Application Server
process.

4. Bugs fixed (https://bugzilla.redhat.com/):

1051277 - CVE-2013-7285 XStream: remote code execution due to insecure XML deserialization

5. References:

https://www.redhat.com/security/data/cve/CVE-2013-7285.html
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.services.platform&downloadType=securityPatches&version=6.0.0

6. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFTIgf6XlSAg2UNWIIRAgyTAKC8c85Vikb/43xfqifbFG2QNXr2JgCbBOvK
bJVLZawVh1QzA3mJwNciDnM=
=wEnz
-----END PGP SIGNATURE-----





More information about the RHSA-announce mailing list