Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1372120 - (CVE-2016-6346) CVE-2016-6346 RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack
CVE-2016-6346 RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to deni...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160901,repor...
: Security
Depends On: 1372122 1456313 1471275 1471276 1372592 1372593 1372848 1372849 1456314 1456315 1456316 1456317
Blocks: 1371804 1372141 1372565 1372568 1372571 1460775 1527613
  Show dependency treegraph
 
Reported: 2016-08-31 20:44 EDT by Jason Shepherd
Modified: 2018-10-19 17:37 EDT (History)
90 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
It was found that GZIPInterceptor is enabled when not necessarily required in RESTEasy. An attacker could use this flaw to launch a Denial of Service attack.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:0517 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform security update 2017-05-02 21:58:28 EDT
Red Hat Product Errata RHSA-2017:0826 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 5 2017-03-22 16:46:23 EDT
Red Hat Product Errata RHSA-2017:0827 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 6 2017-03-22 16:43:37 EDT
Red Hat Product Errata RHSA-2017:0828 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 7 2017-03-22 16:40:43 EDT
Red Hat Product Errata RHSA-2017:0829 normal SHIPPED_LIVE Important: jboss-ec2-eap security, bug fix, and enhancement update 2017-03-22 17:11:17 EDT
Red Hat Product Errata RHSA-2017:1675 normal SHIPPED_LIVE Moderate: Red Hat JBoss BPM Suite security update 2017-07-04 18:00:22 EDT
Red Hat Product Errata RHSA-2017:1676 normal SHIPPED_LIVE Moderate: Red Hat JBoss BRMS security update 2017-07-04 18:00:02 EDT
Red Hat Product Errata RHSA-2018:0002 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.0.9 security update on RHEL 6 2018-01-03 10:30:20 EST
Red Hat Product Errata RHSA-2018:0003 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.0.9 security update 2018-01-03 10:20:33 EST
Red Hat Product Errata RHSA-2018:0004 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.0.9 security update on RHEL 7 2018-01-03 10:31:14 EST
Red Hat Product Errata RHSA-2018:0005 normal SHIPPED_LIVE Important: eap7-jboss-ec2-eap security update 2018-01-03 10:49:39 EST
Red Hat Product Errata RHSA-2018:2143 None None None 2018-07-05 11:29 EDT

  None (edit)
Description Jason Shepherd 2016-08-31 20:44:29 EDT
It was found that GZIPInterceptor is enabled when not necessarily required in RESTEasy. An attacker could use this flaw to launch a Denial of Service attack.
Comment 1 Jason Shepherd 2016-08-31 20:45:21 EDT
Acknowledgments:

Name: Mikhail Egorov (Odin)
Comment 2 Jason Shepherd 2016-08-31 20:50:37 EDT
Created resteasy tracking bugs for this issue:

Affects: fedora-all [bug 1372122]
Comment 12 errata-xmlrpc 2017-03-14 13:32:38 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4.14 

Via RHSA-2017:0517 https://rhn.redhat.com/errata/RHSA-2017-0517.html
Comment 13 errata-xmlrpc 2017-03-22 12:49:21 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7

Via RHSA-2017:0828 https://rhn.redhat.com/errata/RHSA-2017-0828.html
Comment 14 errata-xmlrpc 2017-03-22 12:50:39 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6

Via RHSA-2017:0827 https://rhn.redhat.com/errata/RHSA-2017-0827.html
Comment 15 errata-xmlrpc 2017-03-22 12:51:50 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5

Via RHSA-2017:0826 https://rhn.redhat.com/errata/RHSA-2017-0826.html
Comment 16 errata-xmlrpc 2017-03-22 13:11:38 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6

Via RHSA-2017:0829 https://rhn.redhat.com/errata/RHSA-2017-0829.html
Comment 17 Jason Shepherd 2017-03-29 22:51:59 EDT
Statement:

In order to reduce the risk of being exploited by this vulnerability, the default setting for RESTeasy was changed so that it no longer decodes requests with gzip compression.  If it is desired to accept requests that are compressed with gzip compression, it must be re-enabled; details for how to do so are noted in the following KCS solution:

https://access.redhat.com/solutions/2986611
Comment 19 Jason Shepherd 2017-05-28 20:42:17 EDT
Created resteasy tracking bugs for this issue:

Affects: fedora-all [bug 1456313]
Comment 23 errata-xmlrpc 2017-07-04 14:00:38 EDT
This issue has been addressed in the following products:

  Red Hat JBoss BRMS

Via RHSA-2017:1676 https://access.redhat.com/errata/RHSA-2017:1676
Comment 24 errata-xmlrpc 2017-07-04 14:01:51 EDT
This issue has been addressed in the following products:

  Red Hat JBoss BPM Suite

Via RHSA-2017:1675 https://access.redhat.com/errata/RHSA-2017:1675
Comment 25 Kurt Seifried 2017-07-14 17:15:49 EDT
Created resteasy tracking bugs for this issue:

Affects: fedora-all [bug 1471275]
Comment 27 Jason Shepherd 2017-10-02 19:54:49 EDT
Statement: 

This issue was fixed in EAP 7.1.0, but was not fixed in 7.0.7
Comment 28 errata-xmlrpc 2018-01-03 05:20:59 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2018:0003 https://access.redhat.com/errata/RHSA-2018:0003
Comment 29 errata-xmlrpc 2018-01-03 05:32:10 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6

Via RHSA-2018:0002 https://access.redhat.com/errata/RHSA-2018:0002
Comment 30 errata-xmlrpc 2018-01-03 05:34:28 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7

Via RHSA-2018:0004 https://access.redhat.com/errata/RHSA-2018:0004
Comment 31 errata-xmlrpc 2018-01-03 05:51:23 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6

Via RHSA-2018:0005 https://access.redhat.com/errata/RHSA-2018:0005
Comment 33 errata-xmlrpc 2018-07-05 11:28:23 EDT
This issue has been addressed in the following products:

  Red Hat Decision Manager

Via RHSA-2018:2143 https://access.redhat.com/errata/RHSA-2018:2143

Note You need to log in before you can comment on or make changes to this bug.