ESB-2018.0405 - [RedHat] Red Hat JBoss Core Services: Execute arbitrary code/commands - Remote with user interaction - 2018-02-09


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.0405
         Important: Red Hat JBoss Core Services Apache HTTP Server
                          2.4.23 security update
                              9 February 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat JBoss Core Services
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-15412  

Reference:         ESB-2017.3137

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2018:0287

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update 
Advisory ID:       RHSA-2018:0287-01
Product:           Red Hat JBoss Core Services
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:0287
Issue date:        2018-02-08
CVE Names:         CVE-2017-15412 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Core Services.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Core Services is a set of supplementary software for Red Hat
JBoss middleware products. This software, such as Apache HTTP Server, is
common to multiple JBoss middleware products, and is packaged under Red Hat
JBoss Core Services to allow for faster distribution of updates, and for a
more consistent update experience.

This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23
Service Pack 4 serves as a replacement of Red Hat JBoss Core Services
Apache HTTP Server 2.4.23, and includes bug fixes (including fixes from
previous Service Pack 1,2 and 3), which are documented in the Release Notes
document linked to in the References. 

Security Fix(es):

Details around this issue, including information about the CVE, severity of
the issue, and the CVSS score can be found on the CVE page listed in the
Reference section below.

* chromium-browser: use after free in libxml (CVE-2017-15412, Important)

3. Solution:

The References section of this erratum contains a download link (you must
log in to download the update). Before applying the update, back up your
existing Red Hat JBoss Web Server installation (including all applications
and configuration files).

After installing the updated packages, the httpd daemon will be restarted
automatically.

4. Bugs fixed (https://bugzilla.redhat.com/):

1523128 - CVE-2017-15412 chromium-browser: use after free in libxml

5. References:

https://access.redhat.com/security/cve/CVE-2017-15412
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/cve/CVE-2017-15412
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.23

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD4DBQFafEUnXlSAg2UNWIIRAuVIAJY3mtcwenp/rm3OQiWhCrKr4mz2AKClEANh
4r4QxKKlU0+tdY5y30y80A==
=AuYw
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=avYC
-----END PGP SIGNATURE-----