Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 948106 - (CVE-2013-1921) CVE-2013-1921 JBoss PicketBox: Insecure storage of masked passwords
CVE-2013-1921 JBoss PicketBox: Insecure storage of masked passwords
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20130904,reported=2...
: Security
Depends On: 948109 948147 948148 948149
Blocks: 948111 970481 980700 991853
  Show dependency treegraph
 
Reported: 2013-04-03 23:28 EDT by Arun Babu Neelicattu
Modified: 2015-02-15 16:51 EST (History)
8 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-01-15 13:21:49 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:1207 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.1.1 update 2013-09-04 18:51:19 EDT
Red Hat Product Errata RHSA-2013:1208 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.1.1 update 2013-09-04 18:50:25 EDT
Red Hat Product Errata RHSA-2013:1209 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 6.1.1 update 2013-09-04 18:50:19 EDT
Red Hat Product Errata RHSA-2013:1437 normal SHIPPED_LIVE Important: Red Hat JBoss Portal 6.1.0 update 2013-10-16 16:53:32 EDT
Red Hat Product Errata RHSA-2014:0029 normal SHIPPED_LIVE Important: Red Hat JBoss Data Grid 6.2.0 update 2014-01-15 17:45:50 EST

  None (edit)
Description Arun Babu Neelicattu 2013-04-03 23:28:16 EDT
The data file used by PicketBox Vault to store encrypted passwords contains a copy of its own admin key. The file is encrypted using only this admin key, not the corresponding JKS key. A local attacker with permission to read the vault data file could read the admin key from the file, and use it to decrypt the file and read the stored passwords stored in cleartext.
Comment 7 errata-xmlrpc 2013-09-04 14:55:06 EDT
This issue has been addressed in following products:

  Red Hat JBoss Enterprise Application Platform 6.1.1

Via RHSA-2013:1209 https://rhn.redhat.com/errata/RHSA-2013-1209.html
Comment 8 errata-xmlrpc 2013-09-04 14:57:59 EDT
This issue has been addressed in following products:

  JBEAP 6 for RHEL 6

Via RHSA-2013:1208 https://rhn.redhat.com/errata/RHSA-2013-1208.html
Comment 9 errata-xmlrpc 2013-09-04 15:02:39 EDT
This issue has been addressed in following products:

  JBEAP 6 for RHEL 5

Via RHSA-2013:1207 https://rhn.redhat.com/errata/RHSA-2013-1207.html
Comment 10 errata-xmlrpc 2013-10-16 12:56:27 EDT
This issue has been addressed in following products:

  Red Hat JBoss Portal 6.1.0

Via RHSA-2013:1437 https://rhn.redhat.com/errata/RHSA-2013-1437.html
Comment 11 errata-xmlrpc 2014-01-15 12:46:06 EST
This issue has been addressed in following products:

  Red Hat JBoss Data Grid 6.2.0

Via RHSA-2014:0029 https://rhn.redhat.com/errata/RHSA-2014-0029.html

Note You need to log in before you can comment on or make changes to this bug.