It was found that JBossWS, a J2EE Web Services server, leaked further channel data, by using PKCS#1 v1.5 protocol family / public key encryption scheme in order to distribute the symmetric key. A remote attacker, aware of a cryptographic weakness of the PKCS#1 v1.5 public key encryption scheme, could use this flaw to conduct chosen-encrypted-key attacks, leading to the recovery of the entire plaintext form of the intended symmetric key, to be distributed, by examining of the differences between SOAP responses, sent from JBossWS server. Acknowledgements: Red Hat would like to thank Juraj Somorovsky of Ruhr-University Bochum for reporting this issue.
The CVE identifier of CVE-2011-2487 has been assigned to this issue.
External References: https://www.nds.ruhr-uni-bochum.de/research/publications/breaking-xml-encryption-pkcs15/
Statement: This flaw affects Apache CXF (WSS4J) and jbossws-native as shipped with various JBoss products. It does not affect JBoss Enterprise Application Platform 6 and JBoss Application Server 7.1.1 and above. These products include WSS4J 1.6.5, which incorporates a fix for this flaw. On affected products, this flaw can be mitigated by using the RSA-OAEP key wrap algorithm, instead of the default RSA-v1.5 algorithm. To use RSA-OAEP, edit the jboss-ws-security configuration file and add the property keyWrapAlgorithm="rsa_oaep" to the encrypt element.
Upstream advisory for Apache CXF: http://cxf.apache.org/note-on-cve-2011-2487.html
This issue has been addressed in following products: JBoss Enterprise Application Platform 5.2.0 Via RHSA-2013:0194 https://rhn.redhat.com/errata/RHSA-2013-0194.html
This issue has been addressed in following products: JBEAP 5 for RHEL 5 Via RHSA-2013:0192 https://rhn.redhat.com/errata/RHSA-2013-0192.html
This issue has been addressed in following products: JBEAP 5 for RHEL 6 Via RHSA-2013:0191 https://rhn.redhat.com/errata/RHSA-2013-0191.html
This issue has been addressed in following products: JBEWP 5 for RHEL 6 Via RHSA-2013:0195 https://rhn.redhat.com/errata/RHSA-2013-0195.html
This issue has been addressed in following products: JBEAP 5 for RHEL 4 Via RHSA-2013:0193 https://rhn.redhat.com/errata/RHSA-2013-0193.html
This issue has been addressed in following products: JBEWP 5 for RHEL 4 Via RHSA-2013:0197 https://rhn.redhat.com/errata/RHSA-2013-0197.html
This issue has been addressed in following products: JBEWP 5 for RHEL 5 Via RHSA-2013:0196 https://rhn.redhat.com/errata/RHSA-2013-0196.html
This issue has been addressed in following products: JBoss Enterprise Web Platform 5.2.0 Via RHSA-2013:0198 https://rhn.redhat.com/errata/RHSA-2013-0198.html
This issue has been addressed in following products: JBoss Enterprise BRMS Platform 5.3.1 Via RHSA-2013:0221 https://rhn.redhat.com/errata/RHSA-2013-0221.html
This issue has been addressed in following products: JBoss Enterprise SOA Platform 5.3.1 Via RHSA-2013:0533 https://rhn.redhat.com/errata/RHSA-2013-0533.html
This issue has been addressed in following products: Red Hat JBoss Portal 5.2.2 Via RHSA-2013:0953 https://rhn.redhat.com/errata/RHSA-2013-0953.html
This issue has been addressed in following products: Red Hat JBoss SOA Platform 4.3 CP05 Red Hat JBoss Portal 4.3 CP07 Via RHSA-2013:1757 https://rhn.redhat.com/errata/RHSA-2013-1757.html