Updated cxf packages fix security vulnerabilities
Publication date: 31 Dec 2014Modification date: 31 Dec 2014
Type: security
Affected Mageia releases : 4
CVE: CVE-2014-3584 , CVE-2014-3577
Description
Updated cxf packages fix security vulnerabilities: An Apache CXF JAX-RS service can process SAML tokens received in the authorization header of a request via the SamlHeaderInHandler. However it is possible to cause an infinite loop in the parsing of this header by passing certain bad values for the header, leading to a Denial of Service attack on the service (CVE-2014-3584). Apache CXF is vulnerable to a possible SSL hostname verification bypass, due to a flaw in comparing the server hostname to the domain name in the Subject's DN field. A Man In The Middle attack can exploit this vulnerability by using a specially crafted Subject DN to spoof a valid certificate (CVE-2014-3577).
References
- https://bugs.mageia.org/show_bug.cgi?id=14363
- http://cxf.apache.org/security-advisories.data/CVE-2014-3584.txt.asc
- http://cxf.apache.org/security-advisories.data/CVE-2014-3577.txt.asc
- https://bugzilla.redhat.com/show_bug.cgi?id=1157330
- https://bugzilla.redhat.com/show_bug.cgi?id=1129074
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3584
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3577
SRPMS
4/core
- cxf-2.7.5-3.1.mga4