axis-1.2.1-7.5.AXS4

エラータID: AXSA:2014-534:01

Release date: 
Wednesday, September 17, 2014 - 13:44
Subject: 
axis-1.2.1-7.5.AXS4
Affected Channels: 
Asianux Server 4 for x86
Asianux Server 4 for x86_64
Severity: 
High
Description: 

Description :
Apache AXIS is an implementation of the SOAP ("Simple Object Access Protocol")
submission to W3C.

From the draft W3C specification:

SOAP is a lightweight protocol for exchange of information in a decentralized,
distributed environment. It is an XML based protocol that consists of three
parts: an envelope that defines a framework for describing what is in a message
and how to process it, a set of encoding rules for expressing instances of
application-defined datatypes, and a convention for representing remote
procedure calls and responses.

This project is a follow-on to the Apache SOAP project.

Security issues fixed with this release:

CVE-2014-3596
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.

Solution: 

update package.

Additional Info: 

N/A

Download: 

SRPMS
  1. axis-1.2.1-7.5.AXS4.src.rpm
    MD5: d538bc9c182c4c6094a225f1cf131935
    SHA-256: 89ac49346c902b5beb0dacf0e272e85b61cfa0d2074938904e10049f30406535
    Size: 10.87 MB

Asianux Server 4 for x86
  1. axis-1.2.1-7.5.AXS4.noarch.rpm
    MD5: 286e7a8de806bc6b3891fcbf0098c9e0
    SHA-256: a728ef0fe5b88c65209fdf881a50b6d69413ba60bc77d133e559051d9cbd8e8d
    Size: 1.50 MB

Asianux Server 4 for x86_64
  1. axis-1.2.1-7.5.AXS4.noarch.rpm
    MD5: 24610175367682345bbc47be780f1c94
    SHA-256: 609fe2c8b7ae8bf9021d6db04468ce37fc02d94e06c133b683bf324a3e8c4cf6
    Size: 1.50 MB