RHEL 5 / 6 : JBoss Enterprise Web Server 1.0.2 update (Moderate) (RHSA-2011:0897)

medium Nessus Plugin ID 193971

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 5 / 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2011:0897 advisory.

- tomcat: information disclosure in authentication headers (CVE-2010-1157)

- httpd mod_cache, mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments (CVE-2010-1452)

- apr-util: high memory consumption in apr_brigade_split_line() (CVE-2010-1623)

- tomcat: file permission bypass flaw (CVE-2010-3718)

- tomcat: cross-site-scripting vulnerability in the manager application (CVE-2010-4172)

- tomcat: XSS vulnerability in HTML Manager interface (CVE-2011-0013)

- apr: unconstrained recursion in apr_fnmatch (CVE-2011-0419)

- httpd: mod_proxy_ajp worker moved to error state when timeout exceeded (CVE-2012-4557)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/updates/classification/#moderate

http://www.nessus.org/u?82cadf44

https://bugzilla.redhat.com/show_bug.cgi?id=585331

https://bugzilla.redhat.com/show_bug.cgi?id=618189

https://bugzilla.redhat.com/show_bug.cgi?id=640281

https://bugzilla.redhat.com/show_bug.cgi?id=656246

https://bugzilla.redhat.com/show_bug.cgi?id=675786

https://bugzilla.redhat.com/show_bug.cgi?id=675792

https://bugzilla.redhat.com/show_bug.cgi?id=677655

https://bugzilla.redhat.com/show_bug.cgi?id=677657

https://bugzilla.redhat.com/show_bug.cgi?id=677659

https://bugzilla.redhat.com/show_bug.cgi?id=703390

http://www.nessus.org/u?7e490fd7

https://access.redhat.com/errata/RHSA-2011:0897

Plugin Details

Severity: Medium

ID: 193971

File Name: redhat-RHSA-2011-0897.nasl

Version: 1.1

Type: local

Agent: unix

Published: 4/27/2024

Updated: 4/29/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2011-0013

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:tomcat6, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-dbcp-tomcat5, p-cpe:/a:redhat:enterprise_linux:httpd22-apr, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:tomcat6-admin-webapps, p-cpe:/a:redhat:enterprise_linux:httpd22-manual, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-logging, p-cpe:/a:redhat:enterprise_linux:tomcat6-javadoc, p-cpe:/a:redhat:enterprise_linux:tomcat-native, p-cpe:/a:redhat:enterprise_linux:bcel, p-cpe:/a:redhat:enterprise_linux:ant-apache-regexp, p-cpe:/a:redhat:enterprise_linux:tomcat5-jasper, p-cpe:/a:redhat:enterprise_linux:glassfish-jaf, p-cpe:/a:redhat:enterprise_linux:ant-apache-resolver, p-cpe:/a:redhat:enterprise_linux:tomcat6-log4j, p-cpe:/a:redhat:enterprise_linux:hibernate3-ejb-persistence-3.0-api, p-cpe:/a:redhat:enterprise_linux:mod_cluster-demo, p-cpe:/a:redhat:enterprise_linux:ecj, p-cpe:/a:redhat:enterprise_linux:glassfish-jsf, p-cpe:/a:redhat:enterprise_linux:cglib, p-cpe:/a:redhat:enterprise_linux:xalan-j2, cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:httpd-devel, p-cpe:/a:redhat:enterprise_linux:tomcat5-common-lib, p-cpe:/a:redhat:enterprise_linux:xml-commons-resolver12, p-cpe:/a:redhat:enterprise_linux:ant-jmf, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-fileupload, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-codec, p-cpe:/a:redhat:enterprise_linux:hibernate3-annotations-javadoc, p-cpe:/a:redhat:enterprise_linux:mod_jk, p-cpe:/a:redhat:enterprise_linux:httpd, p-cpe:/a:redhat:enterprise_linux:ant-apache-oro, p-cpe:/a:redhat:enterprise_linux:mod_jk-ap20, cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:hibernate3-entitymanager-javadoc, p-cpe:/a:redhat:enterprise_linux:tomcat6-lib, p-cpe:/a:redhat:enterprise_linux:hibernate3-ejb-persistence-3.0-api-javadoc, p-cpe:/a:redhat:enterprise_linux:mod_ssl22, p-cpe:/a:redhat:enterprise_linux:glassfish-javamail, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-pool, p-cpe:/a:redhat:enterprise_linux:jakarta-oro, p-cpe:/a:redhat:enterprise_linux:jfreechart, p-cpe:/a:redhat:enterprise_linux:ant-junit, p-cpe:/a:redhat:enterprise_linux:tomcat6-servlet-2.5-api, p-cpe:/a:redhat:enterprise_linux:tomcat5-servlet-2.4-api-javadoc, p-cpe:/a:redhat:enterprise_linux:httpd22-apr-util, p-cpe:/a:redhat:enterprise_linux:jboss-transaction-1.0.1-api, p-cpe:/a:redhat:enterprise_linux:regexp, p-cpe:/a:redhat:enterprise_linux:hibernate3, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-chain, p-cpe:/a:redhat:enterprise_linux:jboss-jms-1.1-api, p-cpe:/a:redhat:enterprise_linux:jboss-javaee, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-daemon, p-cpe:/a:redhat:enterprise_linux:jcommon, p-cpe:/a:redhat:enterprise_linux:ant-apache-log4j, p-cpe:/a:redhat:enterprise_linux:jboss-common-logging-spi, p-cpe:/a:redhat:enterprise_linux:mod_ssl, p-cpe:/a:redhat:enterprise_linux:ant-apache-bsf, p-cpe:/a:redhat:enterprise_linux:tomcat5-servlet-2.4-api, p-cpe:/a:redhat:enterprise_linux:xml-commons-which10, p-cpe:/a:redhat:enterprise_linux:hibernate3-entitymanager, p-cpe:/a:redhat:enterprise_linux:httpd22-apr-devel, p-cpe:/a:redhat:enterprise_linux:jboss-common-core, p-cpe:/a:redhat:enterprise_linux:jboss-common-logging-jdk, p-cpe:/a:redhat:enterprise_linux:tomcat5-jsp-2.0-api, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-dbcp, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-pool-tomcat5, p-cpe:/a:redhat:enterprise_linux:tomcat5-jasper-javadoc, p-cpe:/a:redhat:enterprise_linux:tomcat6-el-1.0-api, p-cpe:/a:redhat:enterprise_linux:ant-trax, p-cpe:/a:redhat:enterprise_linux:jakarta-taglibs-standard, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-logging-jboss, p-cpe:/a:redhat:enterprise_linux:xml-commons-resolver11, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-validator, p-cpe:/a:redhat:enterprise_linux:mod_cluster-native, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-collections, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-collections-tomcat5, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-digester, p-cpe:/a:redhat:enterprise_linux:mod_cluster, p-cpe:/a:redhat:enterprise_linux:xml-commons-jaxp-1.2-apis, p-cpe:/a:redhat:enterprise_linux:dom4j, p-cpe:/a:redhat:enterprise_linux:jboss-javaee-poms, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-el, p-cpe:/a:redhat:enterprise_linux:tomcat5-admin-webapps, p-cpe:/a:redhat:enterprise_linux:ant-commons-logging, p-cpe:/a:redhat:enterprise_linux:ant-scripts, p-cpe:/a:redhat:enterprise_linux:ant-apache-bcel, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-httpclient, p-cpe:/a:redhat:enterprise_linux:xml-commons-jaxp-1.3-apis, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-logging-tomcat6, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-io, p-cpe:/a:redhat:enterprise_linux:httpd-manual, p-cpe:/a:redhat:enterprise_linux:httpd22, p-cpe:/a:redhat:enterprise_linux:objectweb-asm, p-cpe:/a:redhat:enterprise_linux:ecj3, p-cpe:/a:redhat:enterprise_linux:ant-javamail, p-cpe:/a:redhat:enterprise_linux:mod_cluster-jbossweb2, p-cpe:/a:redhat:enterprise_linux:ant-jdepend, p-cpe:/a:redhat:enterprise_linux:xml-commons-which11, p-cpe:/a:redhat:enterprise_linux:tomcat6-jsp-2.1-api, p-cpe:/a:redhat:enterprise_linux:hibernate3-commons-annotations-javadoc, p-cpe:/a:redhat:enterprise_linux:tomcat5, p-cpe:/a:redhat:enterprise_linux:hibernate3-annotations, p-cpe:/a:redhat:enterprise_linux:tomcat5-jasper-eclipse, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-modeler, p-cpe:/a:redhat:enterprise_linux:ant-swing, p-cpe:/a:redhat:enterprise_linux:ant, p-cpe:/a:redhat:enterprise_linux:mod_cluster-jbossas, p-cpe:/a:redhat:enterprise_linux:antlr, p-cpe:/a:redhat:enterprise_linux:log4j, p-cpe:/a:redhat:enterprise_linux:xerces-j2, p-cpe:/a:redhat:enterprise_linux:httpd22-apr-util-devel, p-cpe:/a:redhat:enterprise_linux:mx4j, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-beanutils, p-cpe:/a:redhat:enterprise_linux:xml-commons-jaxp-1.1-apis, p-cpe:/a:redhat:enterprise_linux:struts12, p-cpe:/a:redhat:enterprise_linux:tomcat5-jsp-2.0-api-javadoc, p-cpe:/a:redhat:enterprise_linux:tomcat-jkstatus-ant, p-cpe:/a:redhat:enterprise_linux:mod_cluster-tomcat6, p-cpe:/a:redhat:enterprise_linux:ant-antlr, p-cpe:/a:redhat:enterprise_linux:ant-nodeps, p-cpe:/a:redhat:enterprise_linux:httpd-tools, p-cpe:/a:redhat:enterprise_linux:tomcat5-server-lib, p-cpe:/a:redhat:enterprise_linux:xml-commons-resolver10, p-cpe:/a:redhat:enterprise_linux:javassist, p-cpe:/a:redhat:enterprise_linux:xml-commons, p-cpe:/a:redhat:enterprise_linux:ant-commons-net, p-cpe:/a:redhat:enterprise_linux:hibernate3-javadoc, p-cpe:/a:redhat:enterprise_linux:tomcat6-webapps, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-launcher, p-cpe:/a:redhat:enterprise_linux:httpd22-devel, p-cpe:/a:redhat:enterprise_linux:ant-jsch, p-cpe:/a:redhat:enterprise_linux:objectweb-asm31, p-cpe:/a:redhat:enterprise_linux:tomcat5-parent, p-cpe:/a:redhat:enterprise_linux:mod_jk-manual, p-cpe:/a:redhat:enterprise_linux:tomcat6-docs-webapp, p-cpe:/a:redhat:enterprise_linux:jakarta-commons-daemon-jsvc, p-cpe:/a:redhat:enterprise_linux:hibernate3-commons-annotations, p-cpe:/a:redhat:enterprise_linux:tomcat5-webapps

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/22/2011

Vulnerability Publication Date: 6/10/2008

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-1157, CVE-2010-1452, CVE-2010-1623, CVE-2010-3718, CVE-2010-4172, CVE-2011-0013, CVE-2011-0419, CVE-2012-4557

CWE: 79

RHSA: 2011:0897