Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Linux :: Ubuntu :: bt-21175.htm

Tomcat vulnerabilities
Tomcat vulnerabilities
Tomcat vulnerabilities

Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

==========================================================Ubuntu Security Notice USN-788-1              June 15, 2009
tomcat6 vulnerabilities
CVE-2008-5515, CVE-2009-0033, CVE-2009-0580, CVE-2009-0781,
A security issue affects the following Ubuntu releases:

Ubuntu 8.10
Ubuntu 9.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.10:
  libtomcat6-java                 6.0.18-0ubuntu3.2
  tomcat6-examples                6.0.18-0ubuntu3.2

Ubuntu 9.04:
  libtomcat6-java                 6.0.18-0ubuntu6.1
  tomcat6-examples                6.0.18-0ubuntu6.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Iida Minehiko discovered that Tomcat did not properly normalise paths. A
remote attacker could send specially crafted requests to the server and
bypass security restrictions, gaining access to sensitive content.

Yoshihito Fukuyama discovered that Tomcat did not properly handle errors
when the Java AJP connector and mod_jk load balancing are used. A remote
attacker could send specially crafted requests containing invalid headers
to the server and cause a temporary denial of service. (CVE-2009-0033)

D. Matscheko and T. Hackner discovered that Tomcat did not properly handle
malformed URL encoding of passwords when FORM authentication is used. A
remote attacker could exploit this in order to enumerate valid usernames.

Deniz Cevik discovered that Tomcat did not properly escape certain
parameters in the example calendar application which could result in
browsers becoming vulnerable to cross-site scripting attacks when
processing the output. With cross-site scripting vulnerabilities, if a user
were tricked into viewing server output during a crafted server request, a
remote attacker could exploit this to modify the contents, or steal
confidential data (such as passwords), within the same domain.

Philippe Prados discovered that Tomcat allowed web applications to replace
the XML parser used by other web applications. Local users could exploit
this to bypass security restrictions and gain access to certain sensitive
files. (CVE-2009-0783)

Updated packages for Ubuntu 8.10:

  Source archives: 
      Size/MD5:    22010 87c6105cd78ea5a8dbf62054fc4ba0aa 
      Size/MD5:     1378 823c008ffc927c0f3f5686fc6f5188d0 
      Size/MD5:  3484249 9bdbb1c1d79302c80057a70b18fe6721

  Architecture independent packages: 
      Size/MD5:   174164 dd24331b2709bd6641b4055d0b052eae 
      Size/MD5:  2961944 63c8c3e0300ed70a240b79ddd3299efb 
      Size/MD5:    37370 b9b1bd6dc9cfb52107811295401c09e4 
      Size/MD5:    53488 5006e5c394ec815f6d36c335d9f0abaf 
      Size/MD5:   714516 768cacbb74453b1a2a49e55d61b7bedd 
      Size/MD5:   419180 0663de0611fb9792d44aebad8aa24cc4 
      Size/MD5:    18612 95544319007f1f90321469c5d314c72e 
      Size/MD5:    24156 9f4d7a0671e9330ff2fa1a1c13a20c58

Updated packages for Ubuntu 9.04:

  Source archives: 
      Size/MD5:    24779 221e0f51259495fd01da2a6b67358b17 
      Size/MD5:     1411 e3bac3c39b2e6db3267699a533b17add 
      Size/MD5:  3484249 9bdbb1c1d79302c80057a70b18fe6721

  Architecture independent packages: 
      Size/MD5:   246196 54e990e7893923b8b6df4bcce9f3ba22 
      Size/MD5:   172500 abf989790a45def65d5de9a7f9b010df 
      Size/MD5:  2846254 c1c0180751500ce58c51b97de9f2d6d9 
      Size/MD5:    37874 e7d401faba215af22ecff31b4a675fad 
      Size/MD5:    53184 194153ab21adac9a47baaf92ea8d2acb 
      Size/MD5:   714212 d52e9abc75108a8f059346e09d47b511 
      Size/MD5:   418316 3a7110c9da4bd72a7019cbb75651da73 
      Size/MD5:    20520 ea5e54c91e7055e281d61e63f0e140f2 
      Size/MD5:    24952 ec80f910d6c8e606c090ba8dd737bc4c

Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part

Version: GnuPG v1.4.9 (GNU/Linux)



TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH