Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.0422 Important: xalan-j2 security update 2 April 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: xalan-j2 Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 5 Red Hat Enterprise Linux WS/Desktop 5 Red Hat Enterprise Linux Server 6 Red Hat Enterprise Linux WS/Desktop 6 Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-0107 Reference: ESB-2014.0398 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2014-0348.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: xalan-j2 security update Advisory ID: RHSA-2014:0348-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0348.html Issue date: 2014-04-01 CVE Names: CVE-2014-0107 ===================================================================== 1. Summary: Updated xalan-j2 packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - noarch Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch Red Hat Enterprise Linux Server (v. 6) - noarch Red Hat Enterprise Linux Server Optional (v. 6) - noarch Red Hat Enterprise Linux Workstation (v. 6) - noarch Red Hat Enterprise Linux Workstation Optional (v. 6) - noarch 3. Description: Xalan-Java is an XSLT processor for transforming XML documents into HTML, text, or other XML document types. It was found that the secure processing feature of Xalan-Java had insufficient restrictions defined for certain properties and features. A remote attacker able to provide Extensible Stylesheet Language Transformations (XSLT) content to be processed by an application using Xalan-Java could use this flaw to bypass the intended constraints of the secure processing feature. Depending on the components available in the classpath, this could lead to arbitrary remote code execution in the context of the application server running the application that uses Xalan-Java. (CVE-2014-0107) All xalan-j2 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1080248 - CVE-2014-0107 Xalan-Java: insufficient constraints in secure processing feature 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xalan-j2-2.7.0-6jpp.2.src.rpm i386: xalan-j2-2.7.0-6jpp.2.i386.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.i386.rpm xalan-j2-manual-2.7.0-6jpp.2.i386.rpm xalan-j2-xsltc-2.7.0-6jpp.2.i386.rpm x86_64: xalan-j2-2.7.0-6jpp.2.x86_64.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.x86_64.rpm xalan-j2-manual-2.7.0-6jpp.2.x86_64.rpm xalan-j2-xsltc-2.7.0-6jpp.2.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xalan-j2-2.7.0-6jpp.2.src.rpm i386: xalan-j2-debuginfo-2.7.0-6jpp.2.i386.rpm xalan-j2-demo-2.7.0-6jpp.2.i386.rpm xalan-j2-javadoc-2.7.0-6jpp.2.i386.rpm x86_64: xalan-j2-debuginfo-2.7.0-6jpp.2.x86_64.rpm xalan-j2-demo-2.7.0-6jpp.2.x86_64.rpm xalan-j2-javadoc-2.7.0-6jpp.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xalan-j2-2.7.0-6jpp.2.src.rpm i386: xalan-j2-2.7.0-6jpp.2.i386.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.i386.rpm xalan-j2-demo-2.7.0-6jpp.2.i386.rpm xalan-j2-javadoc-2.7.0-6jpp.2.i386.rpm xalan-j2-manual-2.7.0-6jpp.2.i386.rpm xalan-j2-xsltc-2.7.0-6jpp.2.i386.rpm ia64: xalan-j2-2.7.0-6jpp.2.ia64.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.ia64.rpm xalan-j2-demo-2.7.0-6jpp.2.ia64.rpm xalan-j2-javadoc-2.7.0-6jpp.2.ia64.rpm xalan-j2-manual-2.7.0-6jpp.2.ia64.rpm xalan-j2-xsltc-2.7.0-6jpp.2.ia64.rpm ppc: xalan-j2-2.7.0-6jpp.2.ppc.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.ppc.rpm xalan-j2-demo-2.7.0-6jpp.2.ppc.rpm xalan-j2-javadoc-2.7.0-6jpp.2.ppc.rpm xalan-j2-manual-2.7.0-6jpp.2.ppc.rpm xalan-j2-xsltc-2.7.0-6jpp.2.ppc.rpm s390x: xalan-j2-2.7.0-6jpp.2.s390x.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.s390x.rpm xalan-j2-demo-2.7.0-6jpp.2.s390x.rpm xalan-j2-javadoc-2.7.0-6jpp.2.s390x.rpm xalan-j2-manual-2.7.0-6jpp.2.s390x.rpm xalan-j2-xsltc-2.7.0-6jpp.2.s390x.rpm x86_64: xalan-j2-2.7.0-6jpp.2.x86_64.rpm xalan-j2-debuginfo-2.7.0-6jpp.2.x86_64.rpm xalan-j2-demo-2.7.0-6jpp.2.x86_64.rpm xalan-j2-javadoc-2.7.0-6jpp.2.x86_64.rpm xalan-j2-manual-2.7.0-6jpp.2.x86_64.rpm xalan-j2-xsltc-2.7.0-6jpp.2.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/xalan-j2-2.7.0-9.9.el6_5.src.rpm noarch: xalan-j2-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-demo-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-javadoc-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-manual-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-xsltc-2.7.0-9.9.el6_5.noarch.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/xalan-j2-2.7.0-9.9.el6_5.src.rpm noarch: xalan-j2-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-demo-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-javadoc-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-manual-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-xsltc-2.7.0-9.9.el6_5.noarch.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xalan-j2-2.7.0-9.9.el6_5.src.rpm noarch: xalan-j2-2.7.0-9.9.el6_5.noarch.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/xalan-j2-2.7.0-9.9.el6_5.src.rpm noarch: xalan-j2-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-demo-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-javadoc-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-manual-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-xsltc-2.7.0-9.9.el6_5.noarch.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xalan-j2-2.7.0-9.9.el6_5.src.rpm noarch: xalan-j2-2.7.0-9.9.el6_5.noarch.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/xalan-j2-2.7.0-9.9.el6_5.src.rpm noarch: xalan-j2-demo-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-javadoc-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-manual-2.7.0-9.9.el6_5.noarch.rpm xalan-j2-xsltc-2.7.0-9.9.el6_5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0107.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTOv1vXlSAg2UNWIIRAi31AKCBwKSbomajwNPU6traXrM3gHaZAwCfcl99 oGB0uqKJAthGJmyGMoH7Lhw= =tYqh - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUzt3PRLndAQH1ShLAQKPNQ/+LuKTopd2xN+qtEEn92XN2JDYgHMbf5wh PIJ6v/qDCuWZlBpFdzrNXUodDNUnLbMzWsTYt7606vN5nwCBp0q70RC+CrpgXqKG jtUqNwAWEJEZP1KC6g3Z5KVYKoCzbM762T7L+962vtYQz6QOcwoz/hNpbm38Y3k3 R7bh30GQMx1PIXe3horl8mqEtLetc8vhfxFrfA3/65/wOON5IEF9sK5HMrU28MIE mBWLTe2bnMBWMjd5o4fRu1udD5AhMtQPNisl28KVa6Er1bMCeKz1w/sQzQ1byTSM gawyjQT279LUChF9Q0pNCFmMuY6lIEvZC7YlhFlLwZanlHe3n18mmdWyhsnsY2Uh 7aUBiiO5Gi1osEr5foZMUM99gsTYCVVjylCq7geHMZpw6woPOIltU3W96J49NVXW uGwvbPq3E+weNhB+Qe0hsUX+qHSGE6D73sQL44XyjcWOGiuxLOFfEE3cIxnChRm1 XIVTlwQzIZJryh+6s6G9gVCmiekfd0A2L7QBohY4lMjPjkfughY4Q+BIMhcmbzez Ycqn+v71FULklFuyYL1ZYLYkRik1GWrohMStSfv3bXrf07j9A8bcpA6MylFx4dBE zgoRRMApG/fyxuRiCFxg5oq84IlOkRR9inHdBB0KLQo09KpPjtEcPaWik0mKHHAh k7VUXjZimmk= =10SC -----END PGP SIGNATURE-----