Security Issue Alert

Apache CXF Improper Child Policies Enforcement Issue

 
Threat Type:IntelliShield: Security Issue Alert
IntelliShield ID:26104
Version:2
First Published:2012 June 08 23:44 GMT
Last Published:2012 December 19 14:50 GMT
Port: Not available
CVE:CVE-2012-2378
BugTraq ID:53880
Urgency:Unlikely Use
Credibility:Confirmed
Severity:Mild Damage
 
Version Summary:Red Hat has released multiple security advisories and updated packages to address the Apache CXF improper child policies enforcement issue.
 
 
Description
Apache CXF versions 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and version 2.6.0 contain an issue that could result in weaker-than-expected security configurations.

The issue exists because the affected software fails to properly enforce the WS-SecurityPolicy 1.1 child policies on the client system. The client could improperly skip the following policies while being configured by the server:
AlgorithmSuite
SignedParts
SignedElements
EncryptedParts
EncryptedElements


These policies instruct the client to perform encryption or signing elements as directed by the policy, and a failure to apply the policies could lead to unsafe storage or transmission of sensitive information.

Apache has confirmed the issue and software updates are available.
 
Patches/Software
Apache has released a security advisory at the following link: CVE-2012-2378. Apache has released software updates at the following link: Apache CXF

Red Hat has released an official CVE statement and security advisories for bug 826533 at the following links: CVE-2012-2378, RHSA-2012:1591, RHSA-2012:1592, and RHSA-2012:1594

Red Hat has released updated software for registered subscribers at the following link: Red Hat Network. Red Hat packages can be updated on Red Hat Enterprise Linux versions 5 and later using the yum tool.
 
Impact
This issue could reduce the security configuration of the affected application, possibly exposing information to unauthorized users.
 
Safeguards
Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to allow only trusted users to access local systems.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.
 
Alert History
 
Version 1, June 8, 2012, 11:44 PM: Apache CXF contains an issue that could result in weaker-than-expected security configurations. Updates are not available.


Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
Apache Software FoundationCXF 2.4 .5, .6, .7 | 2.5 .0, .1, .2, .3 | 2.6 .0

Associated Products:
Red Hat, Inc.JBoss Enterprise Application Platform 6.0.0 Base | 6 EL5 IA-32, x86_64 | 6 EL6 IA-32, x86_64




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield