Vulnerabilities > CVE-2014-0193 - Resource Management Errors vulnerability in Netty

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

WebSocket08FrameDecoder in Netty 3.6.x before 3.6.9, 3.7.x before 3.7.1, 3.8.x before 3.8.2, 3.9.x before 3.9.1, and 4.0.x before 4.0.19 allows remote attackers to cause a denial of service (memory consumption) via a TextWebSocketFrame followed by a long stream of ContinuationWebSocketFrames.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-2110.NASL
    descriptionSeveral vulnerabilities were discovered in Netty, a Java NIO client/server socket framework : CVE-2014-0193 WebSocket08FrameDecoder allows remote attackers to cause a denial of service (memory consumption) via a TextWebSocketFrame followed by a long stream of ContinuationWebSocketFrames. CVE-2014-3488 The SslHandler allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message. CVE-2019-16869 Netty mishandles whitespace before the colon in HTTP headers (such as a
    last seen2020-03-17
    modified2020-02-20
    plugin id133814
    published2020-02-20
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133814
    titleDebian DLA-2110-1 : netty-3.9 security update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Debian Security Advisory DLA-2110-1. The text
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(133814);
      script_version("1.2");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/24");
    
      script_cve_id("CVE-2014-0193", "CVE-2014-3488", "CVE-2019-16869", "CVE-2019-20444", "CVE-2019-20445", "CVE-2020-7238");
      script_bugtraq_id(67182, 68999);
    
      script_name(english:"Debian DLA-2110-1 : netty-3.9 security update");
      script_summary(english:"Checks dpkg output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Several vulnerabilities were discovered in Netty, a Java NIO
    client/server socket framework :
    
    CVE-2014-0193
    
    WebSocket08FrameDecoder allows remote attackers to cause a denial of
    service (memory consumption) via a TextWebSocketFrame followed by a
    long stream of ContinuationWebSocketFrames.
    
    CVE-2014-3488
    
    The SslHandler allows remote attackers to cause a denial of service
    (infinite loop and CPU consumption) via a crafted SSLv2Hello message.
    
    CVE-2019-16869
    
    Netty mishandles whitespace before the colon in HTTP headers (such as
    a 'Transfer-Encoding : chunked' line), which leads to HTTP request
    smuggling.
    
    CVE-2019-20444
    
    HttpObjectDecoder.java allows an HTTP header that lacks a colon, which
    might be interpreted as a separate header with an incorrect syntax, or
    might be interpreted as an 'invalid fold.'
    
    CVE-2019-20445
    
    HttpObjectDecoder.java allows a Content-Length header to be
    accompanied by a second Content-Length header, or by a
    Transfer-Encoding header.
    
    CVE-2020-7238
    
    Netty allows HTTP Request Smuggling because it mishandles
    Transfer-Encoding whitespace (such as a
    [space]Transfer-Encoding:chunked line) and a later Content-Length
    header.
    
    For Debian 8 'Jessie', these problems have been fixed in version
    3.9.0.Final-1+deb8u1.
    
    We recommend that you upgrade your netty-3.9 packages.
    
    NOTE: Tenable Network Security has extracted the preceding description
    block directly from the DLA security advisory. Tenable has attempted
    to automatically clean and format it as much as possible without
    introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/jessie/netty-3.9"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Upgrade the affected libnetty-3.9-java package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libnetty-3.9-java");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/05/06");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/02/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/02/20");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"8.0", prefix:"libnetty-3.9-java", reference:"3.9.0.Final-1+deb8u1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1020.NASL
    descriptionUpdated Red Hat JBoss Enterprise Application Platform 6.3.0 packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the
    last seen2020-06-01
    modified2020-06-02
    plugin id77079
    published2014-08-08
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77079
    titleRHEL 6 : JBoss EAP (RHSA-2014:1020)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1019.NASL
    descriptionUpdated Red Hat JBoss Enterprise Application Platform 6.3.0 packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the
    last seen2020-06-01
    modified2020-06-02
    plugin id77078
    published2014-08-08
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77078
    titleRHEL 5 : JBoss EAP (RHSA-2014:1019)

Redhat

advisories
  • rhsa
    idRHSA-2014:1019
  • rhsa
    idRHSA-2014:1020
  • rhsa
    idRHSA-2014:1021
  • rhsa
    idRHSA-2014:1351
  • rhsa
    idRHSA-2015:0675
  • rhsa
    idRHSA-2015:0720
  • rhsa
    idRHSA-2015:0765
rpms
  • apache-commons-beanutils-eap6-0:1.8.3-7.redhat_6.1.ep6.el5
  • apache-commons-cli-eap6-0:1.2-6.redhat_4.1.ep6.el5
  • apache-commons-codec-eap6-0:1.4-16.redhat_3.1.ep6.el5
  • apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el5
  • apache-commons-configuration-eap6-0:1.6-1.redhat_3.1.ep6.el5
  • apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el5
  • apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el5
  • apache-commons-io-eap6-0:2.1-8.redhat_3.1.ep6.el5
  • apache-commons-lang-eap6-0:2.6-8.redhat_3.1.ep6.el5
  • apache-mime4j-0:0.6-10.redhat_3.1.ep6.el5
  • cal10n-eap6-0:0.7.3-2.redhat_4.1.ep6.el5
  • codehaus-jackson-0:1.9.9-7.redhat_3.ep6.el5
  • codehaus-jackson-core-asl-0:1.9.9-7.redhat_3.ep6.el5
  • codehaus-jackson-jaxrs-0:1.9.9-7.redhat_3.ep6.el5
  • codehaus-jackson-mapper-asl-0:1.9.9-7.redhat_3.ep6.el5
  • codehaus-jackson-xc-0:1.9.9-7.redhat_3.ep6.el5
  • ecj-eap6-0:4.3.1-3.redhat_1.1.ep6.el5
  • glassfish-jaxb-eap6-0:2.2.5-20.redhat_8.1.ep6.el5
  • gnu-getopt-eap6-0:1.0.13-1.redhat_4.1.ep6.el5
  • guava-libraries-0:13.0.1-3.redhat_1.1.ep6.el5
  • h2database-0:1.3.168-7.redhat_4.1.ep6.el5
  • hibernate4-core-eap6-0:4.2.14-2.SP1_redhat_1.1.ep6.el5
  • hibernate4-eap6-0:4.2.14-2.SP1_redhat_1.1.ep6.el5
  • hibernate4-entitymanager-eap6-0:4.2.14-2.SP1_redhat_1.1.ep6.el5
  • hibernate4-envers-eap6-0:4.2.14-2.SP1_redhat_1.1.ep6.el5
  • hibernate4-infinispan-eap6-0:4.2.14-2.SP1_redhat_1.1.ep6.el5
  • hibernate4-validator-0:4.3.1-2.Final_redhat_1.1.ep6.el5
  • hornetq-0:2.3.20-1.Final_redhat_1.1.ep6.el5
  • hornetq-native-0:2.3.20-2.Final_redhat_1.ep6.el5
  • hornetq-native-debuginfo-0:2.3.20-2.Final_redhat_1.ep6.el5
  • httpclient-eap6-0:4.2.1-10.redhat_1.3.ep6.el5
  • httpcomponents-client-eap6-0:4.2.1-10.redhat_1.3.ep6.el5
  • httpcomponents-core-eap6-0:4.2.1-10.redhat_1.3.ep6.el5
  • httpcomponents-project-eap6-0:6-10.redhat_1.3.ep6.el5
  • httpcore-eap6-0:4.2.1-10.redhat_1.3.ep6.el5
  • httpd-0:2.2.26-35.ep6.el5
  • httpd-debuginfo-0:2.2.26-35.ep6.el5
  • httpd-devel-0:2.2.26-35.ep6.el5
  • httpd-manual-0:2.2.26-35.ep6.el5
  • httpd-tools-0:2.2.26-35.ep6.el5
  • httpmime-eap6-0:4.2.1-10.redhat_1.3.ep6.el5
  • infinispan-0:5.2.10-1.Final_redhat_1.1.ep6.el5
  • infinispan-cachestore-jdbc-0:5.2.10-1.Final_redhat_1.1.ep6.el5
  • infinispan-cachestore-remote-0:5.2.10-1.Final_redhat_1.1.ep6.el5
  • infinispan-client-hotrod-0:5.2.10-1.Final_redhat_1.1.ep6.el5
  • infinispan-core-0:5.2.10-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-common-api-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-common-impl-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-common-spi-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-core-api-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-core-impl-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-deployers-common-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-jdbc-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-spec-api-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el5
  • ironjacamar-validator-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el5
  • jandex-eap6-0:1.0.3-3.Final_redhat_2.2.ep6.el5
  • jansi-eap6-0:1.9-2.redhat_4.3.ep6.el5
  • jaxbintros-0:1.0.2-17.GA_redhat_6.1.ep6.el5
  • jaxen-eap6-0:1.1.3-2.redhat_4.1.ep6.el5
  • jboss-as-appclient-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-cli-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-client-all-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-clustering-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-cmp-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-configadmin-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-connector-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-console-0:2.2.8-1.Final_redhat_1.1.ep6.el5
  • jboss-as-controller-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-controller-client-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-core-security-0:7.4.0-15.Final_redhat_19.1.ep6.el5
  • jboss-as-deployment-repository-0:7.4.0-14.Final_redhat_19.1.ep6.el5
  • jboss-as-deployment-scanner-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-domain-http-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-domain-management-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-ee-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-ee-deployment-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-ejb3-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-embedded-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-host-controller-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-jacorb-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-jaxr-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-jaxrs-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-jdr-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-jmx-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-jpa-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-jsf-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-jsr77-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-logging-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-mail-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-management-client-content-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-messaging-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-modcluster-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-naming-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-network-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-osgi-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-osgi-configadmin-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-osgi-service-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-picketlink-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-platform-mbean-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-pojo-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-process-controller-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-protocol-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-remoting-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-sar-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-security-0:7.4.0-14.Final_redhat_19.1.ep6.el5
  • jboss-as-server-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-system-jmx-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-threads-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-transactions-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-version-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-web-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-webservices-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-weld-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-as-xts-0:7.4.0-13.Final_redhat_19.1.ep6.el5
  • jboss-genericjms-0:1.0.5-1.Final_redhat_1.1.ep6.el5
  • jboss-hal-0:2.2.8-1.Final_redhat_1.1.ep6.el5
  • jboss-jaxws-api_2.2_spec-0:2.0.2-4.Final_redhat_1.1.ep6.el5
  • jboss-jms-api_1.1_spec-0:1.0.1-8.Final_redhat_2.2.ep6.el5
  • jboss-jstl-api_1.2_spec-0:1.0.6-1.Final_redhat_1.1.ep6.el5
  • jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el5
  • jboss-marshalling-0:1.4.6-1.Final_redhat_1.1.ep6.el5
  • jboss-metadata-0:7.1.0-1.Final_redhat_1.1.ep6.el5
  • jboss-metadata-appclient-0:7.1.0-1.Final_redhat_1.1.ep6.el5
  • jboss-metadata-common-0:7.1.0-1.Final_redhat_1.1.ep6.el5
  • jboss-metadata-ear-0:7.1.0-1.Final_redhat_1.1.ep6.el5
  • jboss-metadata-ejb-0:7.1.0-1.Final_redhat_1.1.ep6.el5
  • jboss-metadata-web-0:7.1.0-1.Final_redhat_1.1.ep6.el5
  • jboss-msc-0:1.1.5-1.Final_redhat_1.1.ep6.el5
  • jboss-remoting3-0:3.3.1-1.Final_redhat_1.1.ep6.el5
  • jboss-saaj-api_1.3_spec-0:1.0.3-3.Final_redhat_1.1.ep6.el5
  • jboss-sasl-0:1.0.4-2.Final_redhat_1.1.ep6.el5
  • jboss-security-negotiation-0:2.3.3-1.Final_redhat_1.1.ep6.el5
  • jboss-transaction-api_1.1_spec-0:1.0.1-10.Final_redhat_2.2.ep6.el5
  • jboss-transaction-spi-0:7.1.0-2.Final_redhat_1.1.ep6.el5
  • jboss-vfs2-0:3.2.5-1.Final_redhat_1.1.ep6.el5
  • jbossas-appclient-0:7.4.0-15.Final_redhat_19.1.ep6.el5
  • jbossas-bundles-0:7.4.0-15.Final_redhat_19.1.ep6.el5
  • jbossas-core-0:7.4.0-16.Final_redhat_19.1.ep6.el5
  • jbossas-domain-0:7.4.0-15.Final_redhat_19.1.ep6.el5
  • jbossas-hornetq-native-0:2.3.20-2.Final_redhat_1.ep6.el5
  • jbossas-javadocs-0:7.4.0-20.Final_redhat_19.1.ep6.el5
  • jbossas-jbossweb-native-0:1.1.30-2.redhat_1.ep6.el5
  • jbossas-modules-eap-0:7.4.0-38.Final_redhat_19.1.ep6.el5
  • jbossas-product-eap-0:7.4.0-19.Final_redhat_19.1.ep6.el5
  • jbossas-standalone-0:7.4.0-15.Final_redhat_19.1.ep6.el5
  • jbossas-welcome-content-eap-0:7.4.0-17.Final_redhat_19.1.ep6.el5
  • jbossts-1:4.17.21-2.Final_redhat_2.1.ep6.el5
  • jbossweb-0:7.4.8-4.Final_redhat_4.1.ep6.el5
  • jbossws-common-0:2.3.0-1.Final_redhat_1.1.ep6.el5
  • jbossws-cxf-0:4.3.0-3.Final_redhat_3.1.ep6.el5
  • jbossws-native-0:4.2.0-1.Final_redhat_1.1.ep6.el5
  • jbossws-spi-0:2.3.0-2.Final_redhat_1.1.ep6.el5
  • jdom-eap6-0:1.1.2-6.redhat_4.1.ep6.el5
  • jettison-eap6-0:1.3.1-3.redhat_4.1.ep6.el5
  • jgroups-1:3.2.13-1.Final_redhat_1.1.ep6.el5
  • joda-time-eap6-0:1.6.2-1.redhat_4.1.ep6.el5
  • jython-eap6-0:2.5.2-6.redhat_3.1.ep6.el5
  • mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el5
  • mod_cluster-demo-0:1.2.9-1.Final_redhat_1.1.ep6.el5
  • mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el5
  • mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el5
  • mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el5
  • mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el5
  • mod_rt-0:2.4.1-3.GA.ep6.el5
  • mod_rt-debuginfo-0:2.4.1-3.GA.ep6.el5
  • mod_snmp-0:2.4.1-7.GA.ep6.el5
  • mod_snmp-debuginfo-0:2.4.1-7.GA.ep6.el5
  • mod_ssl-1:2.2.26-35.ep6.el5
  • netty-0:3.6.9-1.Final_redhat_1.1.ep6.el5
  • opensaml-0:2.5.3-4.redhat_2.1.ep6.el5
  • openws-0:1.4.4-3.redhat_2.1.ep6.el5
  • picketlink-bindings-0:2.5.3-8.SP10_redhat_1.1.ep6.el5
  • picketlink-federation-0:2.5.3-9.SP10_redhat_1.1.ep6.el5
  • resteasy-0:2.3.8-4.Final_redhat_3.1.ep6.el5
  • rngom-eap6-0:201103-2.redhat_3.1.ep6.el5
  • scannotation-0:1.0.3-6.redhat_4.2.ep6.el5
  • slf4j-0:1.7.2-13.redhat_3.1.ep6.el5
  • slf4j-eap6-0:1.7.2-13.redhat_3.1.ep6.el5
  • slf4j-jboss-logmanager-0:1.0.3-1.GA_redhat_1.1.ep6.el5
  • snakeyaml-eap6-0:1.8-1.redhat_2.2.ep6.el5
  • stilts-0:0.1.26-13.redhat_4.2.ep6.el5
  • sun-codemodel-0:2.6-4.redhat_2.2.ep6.el5
  • sun-istack-commons-1:2.6.1-10.redhat_2.2.ep6.el5
  • sun-saaj-1.3-impl-0:1.3.16-9.redhat_3.1.ep6.el5
  • sun-txw2-0:20110809-7.redhat_4.1.ep6.el5
  • sun-xsom-0:20110809-7.redhat_3.1.ep6.el5
  • tomcat-native-0:1.1.30-2.redhat_1.ep6.el5
  • tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el5
  • weld-core-0:1.1.23-1.Final_redhat_1.1.ep6.el5
  • woodstox-core-eap6-0:4.2.0-12.redhat_4.1.ep6.el5
  • woodstox-stax2-api-eap6-0:3.1.3-3.redhat_1.1.ep6.el5
  • ws-commons-neethi-0:3.0.2-8.redhat_3.1.ep6.el5
  • wsdl4j-eap6-0:1.6.3-1.redhat_1.1.ep6.el5
  • xml-commons-resolver-eap6-0:1.2-17.redhat_9.1.ep6.el5
  • xmltooling-0:1.3.4-6.redhat_3.1.ep6.el5
  • xom-0:1.2.7-3.redhat_4.1.ep6.el5
  • apache-commons-beanutils-eap6-0:1.8.3-7.redhat_6.1.ep6.el6
  • apache-commons-cli-eap6-0:1.2-6.redhat_4.1.ep6.el6
  • apache-commons-codec-eap6-0:1.4-16.redhat_3.1.ep6.el6
  • apache-commons-collections-eap6-0:3.2.1-15.redhat_3.1.ep6.el6
  • apache-commons-configuration-eap6-0:1.6-1.redhat_3.1.ep6.el6
  • apache-commons-daemon-jsvc-eap6-1:1.0.15-6.redhat_2.ep6.el6
  • apache-commons-daemon-jsvc-eap6-debuginfo-1:1.0.15-6.redhat_2.ep6.el6
  • apache-commons-io-eap6-0:2.1-8.redhat_3.1.ep6.el6
  • apache-commons-lang-eap6-0:2.6-8.redhat_3.1.ep6.el6
  • apache-mime4j-0:0.6-10.redhat_3.1.ep6.el6
  • cal10n-eap6-0:0.7.3-2.redhat_4.1.ep6.el6
  • codehaus-jackson-0:1.9.9-7.redhat_3.ep6.el6
  • codehaus-jackson-core-asl-0:1.9.9-7.redhat_3.ep6.el6
  • codehaus-jackson-jaxrs-0:1.9.9-7.redhat_3.ep6.el6
  • codehaus-jackson-mapper-asl-0:1.9.9-7.redhat_3.ep6.el6
  • codehaus-jackson-xc-0:1.9.9-7.redhat_3.ep6.el6
  • ecj-eap6-0:4.3.1-3.redhat_1.1.ep6.el6
  • glassfish-jaf-0:1.1.1-16.redhat_2.ep6.el6
  • glassfish-jaxb-eap6-0:2.2.5-20.redhat_8.1.ep6.el6
  • gnu-getopt-eap6-0:1.0.13-1.redhat_4.1.ep6.el6
  • guava-libraries-0:13.0.1-3.redhat_1.1.ep6.el6
  • h2database-0:1.3.168-7.redhat_4.1.ep6.el6
  • hibernate4-core-eap6-0:4.2.14-2.SP1_redhat_1.1.ep6.el6
  • hibernate4-eap6-0:4.2.14-2.SP1_redhat_1.1.ep6.el6
  • hibernate4-entitymanager-eap6-0:4.2.14-2.SP1_redhat_1.1.ep6.el6
  • hibernate4-envers-eap6-0:4.2.14-2.SP1_redhat_1.1.ep6.el6
  • hibernate4-infinispan-eap6-0:4.2.14-2.SP1_redhat_1.1.ep6.el6
  • hibernate4-validator-0:4.3.1-2.Final_redhat_1.1.ep6.el6
  • hornetq-0:2.3.20-1.Final_redhat_1.1.ep6.el6
  • hornetq-native-0:2.3.20-2.Final_redhat_1.ep6.el6
  • hornetq-native-debuginfo-0:2.3.20-2.Final_redhat_1.ep6.el6
  • httpclient-eap6-0:4.2.1-10.redhat_1.3.ep6.el6
  • httpcomponents-client-eap6-0:4.2.1-10.redhat_1.3.ep6.el6
  • httpcomponents-core-eap6-0:4.2.1-10.redhat_1.3.ep6.el6
  • httpcomponents-project-eap6-0:6-10.redhat_1.3.ep6.el6
  • httpcore-eap6-0:4.2.1-10.redhat_1.3.ep6.el6
  • httpd-0:2.2.26-35.ep6.el6
  • httpd-debuginfo-0:2.2.26-35.ep6.el6
  • httpd-devel-0:2.2.26-35.ep6.el6
  • httpd-manual-0:2.2.26-35.ep6.el6
  • httpd-tools-0:2.2.26-35.ep6.el6
  • httpmime-eap6-0:4.2.1-10.redhat_1.3.ep6.el6
  • infinispan-0:5.2.10-1.Final_redhat_1.1.ep6.el6
  • infinispan-cachestore-jdbc-0:5.2.10-1.Final_redhat_1.1.ep6.el6
  • infinispan-cachestore-remote-0:5.2.10-1.Final_redhat_1.1.ep6.el6
  • infinispan-client-hotrod-0:5.2.10-1.Final_redhat_1.1.ep6.el6
  • infinispan-core-0:5.2.10-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-common-api-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-common-impl-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-common-spi-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-core-api-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-core-impl-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-deployers-common-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-jdbc-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-spec-api-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el6
  • ironjacamar-validator-eap6-0:1.0.26-1.Final_redhat_1.1.ep6.el6
  • jandex-eap6-0:1.0.3-3.Final_redhat_2.2.ep6.el6
  • jansi-eap6-0:1.9-2.redhat_4.3.ep6.el6
  • jaxbintros-0:1.0.2-17.GA_redhat_6.1.ep6.el6
  • jaxen-eap6-0:1.1.3-2.redhat_4.1.ep6.el6
  • jboss-as-appclient-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-cli-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-client-all-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-clustering-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-cmp-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-configadmin-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-connector-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-console-0:2.2.8-1.Final_redhat_1.1.ep6.el6
  • jboss-as-controller-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-controller-client-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-core-security-0:7.4.0-15.Final_redhat_19.1.ep6.el6
  • jboss-as-deployment-repository-0:7.4.0-14.Final_redhat_19.1.ep6.el6
  • jboss-as-deployment-scanner-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-domain-http-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-domain-management-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-ee-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-ee-deployment-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-ejb3-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-embedded-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-host-controller-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-jacorb-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-jaxr-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-jaxrs-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-jdr-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-jmx-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-jpa-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-jsf-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-jsr77-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-logging-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-mail-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-management-client-content-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-messaging-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-modcluster-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-naming-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-network-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-osgi-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-osgi-configadmin-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-osgi-service-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-picketlink-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-platform-mbean-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-pojo-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-process-controller-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-protocol-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-remoting-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-sar-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-security-0:7.4.0-14.Final_redhat_19.1.ep6.el6
  • jboss-as-server-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-system-jmx-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-threads-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-transactions-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-version-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-web-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-webservices-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-weld-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-as-xts-0:7.4.0-13.Final_redhat_19.1.ep6.el6
  • jboss-genericjms-0:1.0.5-1.Final_redhat_1.1.ep6.el6
  • jboss-hal-0:2.2.8-1.Final_redhat_1.1.ep6.el6
  • jboss-jaxws-api_2.2_spec-0:2.0.2-4.Final_redhat_1.1.ep6.el6
  • jboss-jms-api_1.1_spec-0:1.0.1-8.Final_redhat_2.2.ep6.el6
  • jboss-jstl-api_1.2_spec-0:1.0.6-1.Final_redhat_1.1.ep6.el6
  • jboss-logging-0:3.1.4-1.GA_redhat_1.1.ep6.el6
  • jboss-marshalling-0:1.4.6-1.Final_redhat_1.1.ep6.el6
  • jboss-metadata-0:7.1.0-1.Final_redhat_1.1.ep6.el6
  • jboss-metadata-appclient-0:7.1.0-1.Final_redhat_1.1.ep6.el6
  • jboss-metadata-common-0:7.1.0-1.Final_redhat_1.1.ep6.el6
  • jboss-metadata-ear-0:7.1.0-1.Final_redhat_1.1.ep6.el6
  • jboss-metadata-ejb-0:7.1.0-1.Final_redhat_1.1.ep6.el6
  • jboss-metadata-web-0:7.1.0-1.Final_redhat_1.1.ep6.el6
  • jboss-msc-0:1.1.5-1.Final_redhat_1.1.ep6.el6
  • jboss-remoting3-0:3.3.1-1.Final_redhat_1.1.ep6.el6
  • jboss-saaj-api_1.3_spec-0:1.0.3-3.Final_redhat_1.1.ep6.el6
  • jboss-sasl-0:1.0.4-2.Final_redhat_1.1.ep6.el6
  • jboss-security-negotiation-0:2.3.3-1.Final_redhat_1.1.ep6.el6
  • jboss-transaction-api_1.1_spec-0:1.0.1-10.Final_redhat_2.2.ep6.el6
  • jboss-transaction-spi-0:7.1.0-2.Final_redhat_1.1.ep6.el6
  • jboss-vfs2-0:3.2.5-1.Final_redhat_1.1.ep6.el6
  • jbossas-appclient-0:7.4.0-15.Final_redhat_19.1.ep6.el6
  • jbossas-bundles-0:7.4.0-15.Final_redhat_19.1.ep6.el6
  • jbossas-core-0:7.4.0-16.Final_redhat_19.1.ep6.el6
  • jbossas-domain-0:7.4.0-15.Final_redhat_19.1.ep6.el6
  • jbossas-hornetq-native-0:2.3.20-2.Final_redhat_1.ep6.el6
  • jbossas-javadocs-0:7.4.0-20.Final_redhat_19.1.ep6.el6
  • jbossas-jbossweb-native-0:1.1.30-2.redhat_1.ep6.el6
  • jbossas-modules-eap-0:7.4.0-38.Final_redhat_19.1.ep6.el6
  • jbossas-product-eap-0:7.4.0-19.Final_redhat_19.1.ep6.el6
  • jbossas-standalone-0:7.4.0-15.Final_redhat_19.1.ep6.el6
  • jbossas-welcome-content-eap-0:7.4.0-17.Final_redhat_19.1.ep6.el6
  • jbossts-1:4.17.21-2.Final_redhat_2.1.ep6.el6
  • jbossweb-0:7.4.8-4.Final_redhat_4.1.ep6.el6
  • jbossws-common-0:2.3.0-1.Final_redhat_1.1.ep6.el6
  • jbossws-cxf-0:4.3.0-3.Final_redhat_3.1.ep6.el6
  • jbossws-native-0:4.2.0-1.Final_redhat_1.1.ep6.el6
  • jbossws-spi-0:2.3.0-2.Final_redhat_1.1.ep6.el6
  • jdom-eap6-0:1.1.2-6.redhat_4.1.ep6.el6
  • jettison-eap6-0:1.3.1-3.redhat_4.1.ep6.el6
  • jgroups-1:3.2.13-1.Final_redhat_1.1.ep6.el6
  • joda-time-eap6-0:1.6.2-1.redhat_4.1.ep6.el6
  • jython-eap6-0:2.5.2-6.redhat_3.1.ep6.el6
  • mod_cluster-0:1.2.9-1.Final_redhat_1.1.ep6.el6
  • mod_cluster-demo-0:1.2.9-1.Final_redhat_1.1.ep6.el6
  • mod_cluster-native-0:1.2.9-3.Final_redhat_2.ep6.el6
  • mod_cluster-native-debuginfo-0:1.2.9-3.Final_redhat_2.ep6.el6
  • mod_jk-ap22-0:1.2.40-2.redhat_1.ep6.el6
  • mod_jk-debuginfo-0:1.2.40-2.redhat_1.ep6.el6
  • mod_rt-0:2.4.1-5.GA.ep6.el6
  • mod_rt-debuginfo-0:2.4.1-5.GA.ep6.el6
  • mod_snmp-0:2.4.1-8.GA.ep6.el6
  • mod_snmp-debuginfo-0:2.4.1-8.GA.ep6.el6
  • mod_ssl-1:2.2.26-35.ep6.el6
  • netty-0:3.6.9-1.Final_redhat_1.1.ep6.el6
  • opensaml-0:2.5.3-4.redhat_2.1.ep6.el6
  • openws-0:1.4.4-3.redhat_2.1.ep6.el6
  • picketlink-bindings-0:2.5.3-8.SP10_redhat_1.1.ep6.el6
  • picketlink-federation-0:2.5.3-9.SP10_redhat_1.1.ep6.el6
  • resteasy-0:2.3.8-4.Final_redhat_3.1.ep6.el6
  • rngom-eap6-0:201103-2.redhat_3.1.ep6.el6
  • scannotation-0:1.0.3-6.redhat_4.2.ep6.el6
  • slf4j-eap6-0:1.7.2-13.redhat_3.1.ep6.el6
  • slf4j-jboss-logmanager-0:1.0.3-1.GA_redhat_1.1.ep6.el6
  • snakeyaml-eap6-0:1.8-1.redhat_2.2.ep6.el6
  • stilts-0:0.1.26-13.redhat_4.2.ep6.el6
  • sun-codemodel-0:2.6-4.redhat_2.2.ep6.el6
  • sun-istack-commons-1:2.6.1-10.redhat_2.2.ep6.el6
  • sun-saaj-1.3-impl-0:1.3.16-9.redhat_3.1.ep6.el6
  • sun-txw2-0:20110809-7.redhat_4.1.ep6.el6
  • sun-xsom-0:20110809-7.redhat_3.1.ep6.el6
  • tomcat-native-0:1.1.30-2.redhat_1.ep6.el6
  • tomcat-native-debuginfo-0:1.1.30-2.redhat_1.ep6.el6
  • weld-core-0:1.1.23-1.Final_redhat_1.1.ep6.el6
  • woodstox-core-eap6-0:4.2.0-12.redhat_4.1.ep6.el6
  • woodstox-stax2-api-eap6-0:3.1.3-3.redhat_1.1.ep6.el6
  • ws-commons-neethi-0:3.0.2-8.redhat_3.1.ep6.el6
  • wsdl4j-eap6-0:1.6.3-1.redhat_1.1.ep6.el6
  • xml-commons-resolver-eap6-0:1.2-17.redhat_9.1.ep6.el6
  • xmltooling-0:1.3.4-6.redhat_3.1.ep6.el6
  • xom-0:1.2.7-3.redhat_4.1.ep6.el6