Updated Messaging component packages that fix one security issue, severalbugs, and add various enhancements are now available for Red Hat EnterpriseMRG 2.5 for Red Hat Enterprise Linux 5.The Red Hat Security Response Team has rated this update as having Moderatesecurity impact. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available from the CVE link inthe References section.
Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generationIT infrastructure for enterprise computing. MRG offers increasedperformance, reliability, interoperability, and faster computing forenterprise customers.MRG Messaging is a high-speed reliable messaging distribution for Linuxbased on AMQP (Advanced Message Queuing Protocol), an open protocolstandard for enterprise messaging that is designed to make mission criticalmessaging widely available as a standard service, and to make enterprisemessaging interoperable across platforms, programming languages, andvendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10client libraries for C++, Java JMS, and Python; as well as persistencelibraries and management tools.It was found that MRG Management Console (cumin) used the crypt(3)DES-based hash function to hash passwords. DES-based hashing has knownweaknesses that allow an attacker to more easily recover plain textpasswords from hashes via brute-force guessing. An attacker able tocompromise a cumin user database could potentially use this flaw to recoverplain text passwords from the password hashes stored in that database.(CVE-2013-6445)Note: In deployments where user account information is stored in a databasemanaged by cumin, it is recommended that users change their passwords afterthis update is applied.This issue was discovered by Tomáš Nováčik of the Red Hat MRG QualityEngineering team.This update also fixes several bugs and adds enhancements.Documentation for these changes will be available shortly from theTechnical Notes document linked to in the References section.All users of the Messaging capabilities of Red Hat Enterprise MRG areadvised to upgrade to these updated packages, which resolve these issuesand add these enhancements. After installing the updated packages, stop thecluster by either running “service qpidd stop” on all nodes, or”qpid-cluster –all-stop” on any one of the cluster nodes. Once stopped,restart the cluster with “service qpidd start” on all nodes for the updateto take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258
1044315 – CVE-2013-6445 cumin: weak password hashing
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from: