Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1165522 - (CVE-2014-7853) CVE-2014-7853 JBoss AS/WildFly JacORB Subsystem: Information disclosure via incorrect sensitivity classification of attribute
CVE-2014-7853 JBoss AS/WildFly JacORB Subsystem: Information disclosure via i...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150211,repor...
: Security
Depends On: 1165523 1165524 1187334
Blocks: 1155350 1164637 1217043
  Show dependency treegraph
 
Reported: 2014-11-19 01:06 EST by Arun Babu Neelicattu
Modified: 2018-02-06 14:22 EST (History)
32 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was discovered that the JBoss Application Server (WildFly) JacORB subsystem incorrectly assigned socket-binding-ref sensitivity classification for the security-domain attribute. An authenticated user with a role that has access to attributes with socket-binding-ref and not security-domain-ref sensitivity classification could use this flaw to access sensitive information present in the security-domain attribute.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:0215 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.3.3 update 2015-02-11 20:06:34 EST
Red Hat Product Errata RHSA-2015:0216 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.3.3 update 2015-02-11 20:18:36 EST
Red Hat Product Errata RHSA-2015:0217 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.3.3 update 2015-02-11 20:16:58 EST
Red Hat Product Errata RHSA-2015:0218 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.3.3 update 2015-02-11 20:36:41 EST
Red Hat Product Errata RHSA-2015:0920 normal SHIPPED_LIVE Moderate: Red Hat JBoss Operations Network 3.3.2 update 2015-04-30 16:09:30 EDT

  None (edit)
Description Arun Babu Neelicattu 2014-11-19 01:06:16 EST
It was discovered that the JBoss Application Server (WildFly) JacORB subsystem incorrectly assigned socket-binding-ref sensitivity classification for the security-domain attribute. This flaw can be used by an authenticated user with a role that have access to attributes with socket-binding-ref and not security-domain-ref sensitivity classification to access sensitive information present in the security-domain attribute.
Comment 2 Arun Babu Neelicattu 2014-11-19 01:10:34 EST
Acknowledgements:

This issue was discovered by Darran Lofthouse of the Red Hat JBoss Enterprise Application Platform Team.
Comment 4 errata-xmlrpc 2015-02-11 15:07:14 EST
This issue has been addressed in the following products:

  JBoss Enterprise Application Platform 6.3.3

Via RHSA-2015:0215 https://rhn.redhat.com/errata/RHSA-2015-0215.html
Comment 5 errata-xmlrpc 2015-02-11 15:26:44 EST
This issue has been addressed in the following products:

  JBEAP 6.3.z for RHEL 6

Via RHSA-2015:0217 https://rhn.redhat.com/errata/RHSA-2015-0217.html
Comment 6 errata-xmlrpc 2015-02-11 15:30:52 EST
This issue has been addressed in the following products:

  JBEAP 6.3.z for RHEL 5

Via RHSA-2015:0216 https://rhn.redhat.com/errata/RHSA-2015-0216.html
Comment 7 errata-xmlrpc 2015-02-11 16:14:53 EST
This issue has been addressed in the following products:

  JBEAP 6.3.z for RHEL 7

Via RHSA-2015:0218 https://rhn.redhat.com/errata/RHSA-2015-0218.html
Comment 12 errata-xmlrpc 2015-04-30 12:10:26 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Operations Network 3.3

Via RHSA-2015:0920 https://rhn.redhat.com/errata/RHSA-2015-0920.html

Note You need to log in before you can comment on or make changes to this bug.