Bug 963984 (CVE-2013-2102)

Summary: CVE-2013-2102 Gatein: JGroups configurations enable diagnostics without authentication
Product: [Other] Security Response Reporter: Arun Babu Neelicattu <aneelica>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: dereed, djorm, grocha, security-response-team, theute
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=low,public=20131016,reported=20130516,source=redhat,cvss2=3.3/AV:A/AC:L/Au:N/C:P/I:N/A:N,jpp-6/Requirements=affected,epp-5/Requirements=wontfix
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-10-16 21:35:31 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Bug Depends On: 963992, 963993    
Bug Blocks: 963795, 970481    

Description Arun Babu Neelicattu 2013-05-16 19:49:17 EDT
When a JGroups channel is started, the JGroups diagnostics service will be enabled by default with no authentication. This service is exposed via IP multicast. An attacker on an adjacent network can exploit this flaw only to read diagnostics information (information disclosure).
Comment 4 Murray McAllister 2013-05-21 22:18:55 EDT
Acknowledgements:

This issue was discovered by Red Hat.
Comment 5 errata-xmlrpc 2013-10-16 12:57:25 EDT
This issue has been addressed in following products:

  Red Hat JBoss Portal 6.1.0

Via RHSA-2013:1437 https://rhn.redhat.com/errata/RHSA-2013-1437.html