Quantcast
Channel: CodeSection,代码区,Linux操作系统:Ubuntu_Centos_Debian - CodeSec
Viewing all articles
Browse latest Browse all 11063

USN-3024-1: tomcat6, tomcat7 vulnerabilities

$
0
0
Severity

Medium

Vendor

Canonical Ubuntu

Versions Affected Canonical Ubuntu 14.04 LTS Description

It was discovered that Tomcat incorrectly handled pathnames used by web applications in a getResource, getResourceAsStream, or getResourcePaths call. A remote attacker could use this issue to possibly list a parent directory . This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. ( CVE-2015-5174 )

It was discovered that the Tomcat mapper component incorrectly handled redirects. A remote attacker could use this issue to determine the existence of a directory. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. ( CVE-2015-5345 )

It was discovered that Tomcat incorrectly handled different session settings when multiple versions of the same web application was deployed. A remote attacker could possibly use this issue to hijack web sessions. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.10. ( CVE-2015-5346 )

It was discovered that the Tomcat Manager and Host Manager applications incorrectly handled new requests. A remote attacker could possibly use this issue to bypass CSRF protection mechanisms. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.10. ( CVE-2015-5351 )

It was discovered that Tomcat did not place StatusManagerServlet on the RestrictedServlets list. A remote attacker could possibly use this issue to read arbitrary HTTP requests, including session ID values. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. ( CVE-2016-0706 )

It was discovered that the Tomcat session-persistence implementation incorrectly handled session attributes. A remote attacker could possibly use this issue to execute arbitrary code in a privileged context. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. ( CVE-2016-0714 )

It was discovered that the Tomcat setGlobalContext method incorrectly checked if callers were authorized. A remote attacker could possibly use this issue to read or wite to arbitrary application data, or cause a denial of service. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. ( CVE-2016-0763 )

It was discovered that the Tomcat Fileupload library incorrectly handled certain upload requests. A remote attacker could possibly use this issue to cause a denial of service. ( CVE-2016-3092 )

Affected Products and Versions

Severity is medium unless otherwise noted.

All versions of UAA prior to v3.6.0 All versions of UAA BOSH Release prior to v13.0 Mitigation

OSS users are strongly encouraged to follow one of the mitigations below:

Upgrade to the latest version of cf-release [1] For standalone UAA users upgrade UAA Release to v3.6.0 [2] or later, UAA BOSH Release v13 [3] or later References [1] https://github.com/cloudfoundry/cf-release/releases [2] https://github.com/cloudfoundry/uaa/releases/tag/3.6.0 [3] https://github.com/cloudfoundry/uaa-release/releases/tag/v13 https://www.ubuntu.com/usn/usn-3024-1 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5174 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5345 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5346 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5351 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0706 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0714 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0763 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-3092

Viewing all articles
Browse latest Browse all 11063

Trending Articles