Rapid7 Vulnerability & Exploit Database

RHSA-2011:0897: JBoss Enterprise Web Server 1.0.2 update

Back to Search

RHSA-2011:0897: JBoss Enterprise Web Server 1.0.2 update



JBoss Enterprise Web Server 1.0.2 is now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

JBoss Enterprise Web Server is a fully-integrated and certified set of components for hosting Java web applications. This is the first release of JBoss Enterprise Web Server for Red Hat Enterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, this release serves as a replacement for JBoss Enterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to the Release Notes, linked in the References, for more information. This update corrects security flaws in the following components: tomcat6: A cross-site scripting (XSS) flaw was found in the Manager application, used for managing web applications on Apache Tomcat. If a remote attacker could trick a user who is logged into the Manager application into visiting a specially-crafted URL, the attacker could perform Manager application tasks with the privileges of the logged in user. (CVE-2010-4172) tomcat5 and tomcat6: It was found that web applications could modify the location of the Apache Tomcat host's work directory. As web applications deployed on Tomcat have read and write access to this directory, a malicious web application could use this flaw to trick Tomcat into giving it read and write access to an arbitrary directory on the file system. (CVE-2010-3718) A second cross-site scripting (XSS) flaw was found in the Manager application. A malicious web application could use this flaw to conduct an XSS attack, leading to arbitrary web script execution with the privileges of victims who are logged into and viewing Manager application web pages. (CVE-2011-0013) A possible minor information leak was found in the way Apache Tomcat generated HTTP BASIC and DIGEST authentication requests. For configurations where a realm name was not specified and Tomcat was accessed via a proxy, the default generated realm contained the hostname and port used by the proxy to send requests to the Tomcat server. (CVE-2010-1157) httpd: A flaw was found in the way the mod_dav module of the Apache HTTP Server handled certain requests. If a remote attacker were to send a carefully crafted request to the server, it could cause the httpd child process to crash. (CVE-2010-1452) apr: It was found that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching. (CVE-2011-0419) apr-util: It was found that certain input could cause the apr-util library to allocate more memory than intended in the apr_brigade_split_line() function. An attacker able to provide input in small chunks to an application using the apr-util library (such as httpd) could possibly use this flaw to trigger high memory consumption. Note: This issue only affected the JBoss Enterprise Web Server packages on Red Hat Enterprise Linux 4. (CVE-2010-1623) All users of JBoss Enterprise Web Server 1.0.1 are advised to upgrade to JBoss Enterprise Web Server 1.0.2, which corrects these issues. After installing this update, the relevant Apache Tomcat service ("tomcat5" or "tomcat6") and the Apache HTTP Server ("httpd") must be restarted for the update to take effect.


  • redhat-upgrade-ant
  • redhat-upgrade-ant-antlr
  • redhat-upgrade-ant-apache-bcel
  • redhat-upgrade-ant-apache-bsf
  • redhat-upgrade-ant-apache-log4j
  • redhat-upgrade-ant-apache-oro
  • redhat-upgrade-ant-apache-regexp
  • redhat-upgrade-ant-apache-resolver
  • redhat-upgrade-ant-commons-logging
  • redhat-upgrade-ant-commons-net
  • redhat-upgrade-ant-javamail
  • redhat-upgrade-ant-jdepend
  • redhat-upgrade-ant-jmf
  • redhat-upgrade-ant-jsch
  • redhat-upgrade-ant-junit
  • redhat-upgrade-ant-nodeps
  • redhat-upgrade-ant-scripts
  • redhat-upgrade-ant-swing
  • redhat-upgrade-ant-trax
  • redhat-upgrade-antlr
  • redhat-upgrade-bcel
  • redhat-upgrade-cglib
  • redhat-upgrade-dom4j
  • redhat-upgrade-ecj
  • redhat-upgrade-ecj3
  • redhat-upgrade-glassfish-jaf
  • redhat-upgrade-glassfish-javamail
  • redhat-upgrade-glassfish-jsf
  • redhat-upgrade-hibernate3
  • redhat-upgrade-hibernate3-annotations
  • redhat-upgrade-hibernate3-annotations-javadoc
  • redhat-upgrade-hibernate3-commons-annotations
  • redhat-upgrade-hibernate3-commons-annotations-javadoc
  • redhat-upgrade-hibernate3-ejb-persistence-3-0-api
  • redhat-upgrade-hibernate3-ejb-persistence-3-0-api-javadoc
  • redhat-upgrade-hibernate3-entitymanager
  • redhat-upgrade-hibernate3-entitymanager-javadoc
  • redhat-upgrade-hibernate3-javadoc
  • redhat-upgrade-httpd
  • redhat-upgrade-httpd-devel
  • redhat-upgrade-httpd-manual
  • redhat-upgrade-httpd-tools
  • redhat-upgrade-httpd22
  • redhat-upgrade-httpd22-apr
  • redhat-upgrade-httpd22-apr-devel
  • redhat-upgrade-httpd22-apr-util
  • redhat-upgrade-httpd22-apr-util-devel
  • redhat-upgrade-httpd22-devel
  • redhat-upgrade-httpd22-manual
  • redhat-upgrade-jakarta-commons-beanutils
  • redhat-upgrade-jakarta-commons-chain
  • redhat-upgrade-jakarta-commons-codec
  • redhat-upgrade-jakarta-commons-collections
  • redhat-upgrade-jakarta-commons-collections-tomcat5
  • redhat-upgrade-jakarta-commons-daemon
  • redhat-upgrade-jakarta-commons-daemon-jsvc
  • redhat-upgrade-jakarta-commons-dbcp
  • redhat-upgrade-jakarta-commons-dbcp-tomcat5
  • redhat-upgrade-jakarta-commons-digester
  • redhat-upgrade-jakarta-commons-el
  • redhat-upgrade-jakarta-commons-fileupload
  • redhat-upgrade-jakarta-commons-httpclient
  • redhat-upgrade-jakarta-commons-io
  • redhat-upgrade-jakarta-commons-launcher
  • redhat-upgrade-jakarta-commons-logging
  • redhat-upgrade-jakarta-commons-logging-jboss
  • redhat-upgrade-jakarta-commons-logging-tomcat6
  • redhat-upgrade-jakarta-commons-modeler
  • redhat-upgrade-jakarta-commons-pool
  • redhat-upgrade-jakarta-commons-pool-tomcat5
  • redhat-upgrade-jakarta-commons-validator
  • redhat-upgrade-jakarta-oro
  • redhat-upgrade-jakarta-taglibs-standard
  • redhat-upgrade-javassist
  • redhat-upgrade-jboss-common-core
  • redhat-upgrade-jboss-common-logging-jdk
  • redhat-upgrade-jboss-common-logging-spi
  • redhat-upgrade-jboss-javaee
  • redhat-upgrade-jboss-javaee-poms
  • redhat-upgrade-jboss-jms-1-1-api
  • redhat-upgrade-jboss-transaction-1-0-1-api
  • redhat-upgrade-jcommon
  • redhat-upgrade-jfreechart
  • redhat-upgrade-log4j
  • redhat-upgrade-mod_cluster-demo
  • redhat-upgrade-mod_cluster-jbossas
  • redhat-upgrade-mod_cluster-jbossweb2
  • redhat-upgrade-mod_cluster-native
  • redhat-upgrade-mod_cluster-tomcat6
  • redhat-upgrade-mod_jk-ap20
  • redhat-upgrade-mod_jk-manual
  • redhat-upgrade-mod_ssl
  • redhat-upgrade-mod_ssl22
  • redhat-upgrade-mx4j
  • redhat-upgrade-objectweb-asm
  • redhat-upgrade-objectweb-asm31
  • redhat-upgrade-regexp
  • redhat-upgrade-struts12
  • redhat-upgrade-tomcat-jkstatus-ant
  • redhat-upgrade-tomcat-native
  • redhat-upgrade-tomcat5
  • redhat-upgrade-tomcat5-admin-webapps
  • redhat-upgrade-tomcat5-common-lib
  • redhat-upgrade-tomcat5-jasper
  • redhat-upgrade-tomcat5-jasper-eclipse
  • redhat-upgrade-tomcat5-jasper-javadoc
  • redhat-upgrade-tomcat5-jsp-2-0-api
  • redhat-upgrade-tomcat5-jsp-2-0-api-javadoc
  • redhat-upgrade-tomcat5-parent
  • redhat-upgrade-tomcat5-server-lib
  • redhat-upgrade-tomcat5-servlet-2-4-api
  • redhat-upgrade-tomcat5-servlet-2-4-api-javadoc
  • redhat-upgrade-tomcat5-webapps
  • redhat-upgrade-tomcat6
  • redhat-upgrade-tomcat6-admin-webapps
  • redhat-upgrade-tomcat6-docs-webapp
  • redhat-upgrade-tomcat6-el-1-0-api
  • redhat-upgrade-tomcat6-javadoc
  • redhat-upgrade-tomcat6-jsp-2-1-api
  • redhat-upgrade-tomcat6-lib
  • redhat-upgrade-tomcat6-log4j
  • redhat-upgrade-tomcat6-servlet-2-5-api
  • redhat-upgrade-tomcat6-webapps
  • redhat-upgrade-xalan-j2
  • redhat-upgrade-xerces-j2
  • redhat-upgrade-xml-commons
  • redhat-upgrade-xml-commons-jaxp-1-1-apis
  • redhat-upgrade-xml-commons-jaxp-1-2-apis
  • redhat-upgrade-xml-commons-jaxp-1-3-apis
  • redhat-upgrade-xml-commons-resolver10
  • redhat-upgrade-xml-commons-resolver11
  • redhat-upgrade-xml-commons-resolver12
  • redhat-upgrade-xml-commons-which10
  • redhat-upgrade-xml-commons-which11

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center