{"id":"RHSA-2016:1635","summary":"Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 Service Pack 1 security update","modified":"2026-03-18T11:30:09.403366Z","published":"2024-09-15T23:31:38Z","upstream":["CVE-2016-5387","CVE-2016-5388"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1635"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-US/Red_Hat_JBoss_Web_Server/3/html-single/3.0.3_Release_Notes/index.html"},{"type":"ARTICLE","url":"https://access.redhat.com/security/vulnerabilities/httpoxy"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/2435491"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1353755"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1353809"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JWS-483"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1635.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5387"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5387"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5387"},{"type":"ARTICLE","url":"https://httpoxy.org/"},{"type":"ARTICLE","url":"https://www.apache.org/security/asf-httpoxy-response.txt"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5388"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5388"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5388"}],"affected":[{"package":{"name":"httpd24","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/httpd24"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-62.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"httpd24-debuginfo","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/httpd24-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-62.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"httpd24-devel","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/httpd24-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-62.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"httpd24-manual","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/httpd24-manual"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-62.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"httpd24-tools","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/httpd24-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-62.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"mod_ldap24","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/mod_ldap24"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-62.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"mod_proxy24_html","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/mod_proxy24_html"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.4.6-62.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"mod_session24","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/mod_session24"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-62.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"mod_ssl24","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/mod_ssl24"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.4.6-62.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat7","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-51_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat7-admin-webapps","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat7-admin-webapps"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-51_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat7-docs-webapp","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat7-docs-webapp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-51_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat7-el-2.2-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat7-el-2.2-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-51_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat7-javadoc","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat7-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-51_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat7-jsp-2.2-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat7-jsp-2.2-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-51_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat7-lib","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat7-lib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-51_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat7-log4j","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat7-log4j"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-51_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat7-servlet-3.0-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat7-servlet-3.0-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-51_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat7-webapps","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat7-webapps"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-51_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat8","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-62_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat8-admin-webapps","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat8-admin-webapps"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-62_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat8-docs-webapp","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat8-docs-webapp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-62_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat8-el-2.2-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat8-el-2.2-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-62_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat8-javadoc","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat8-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-62_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat8-jsp-2.3-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat8-jsp-2.3-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-62_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat8-lib","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat8-lib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-62_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat8-log4j","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat8-log4j"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-62_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat8-servlet-3.1-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat8-servlet-3.1-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-62_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}},{"package":{"name":"tomcat8-webapps","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el7","purl":"pkg:rpm/redhat/tomcat8-webapps"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-62_patch_01.ep7.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1635.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N"}]}