SCIENTIFIC-LINUX-ERRATA Archives

December 2011

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Constance Sieh <[log in to unmask]>
Reply To:
Date:
Tue, 20 Dec 2011 16:36:43 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (68 lines)
Synopsis:    Moderate: tomcat5 security update
Issue Date:  2011-12-20
CVE Numbers: CVE-2011-0013
             CVE-2010-3718
             CVE-2011-2204
             CVE-2011-1184


Apache Tomcat is a servlet container for the Java Servlet and JavaServer
Pages (JSP) technologies.

It was found that web applications could modify the location of the Tomcat
host's work directory. As web applications deployed on Tomcat have read and
write access to this directory, a malicious web application could use this
flaw to trick Tomcat into giving it read and write access to an arbitrary
directory on the file system. (CVE-2010-3718)

A cross-site scripting (XSS) flaw was found in the Manager application,
used for managing web applications on Apache Tomcat. A malicious web
application could use this flaw to conduct an XSS attack, leading to
arbitrary web script execution with the privileges of victims who are
logged into and viewing Manager application web pages. (CVE-2011-0013)

Multiple flaws were found in the way Tomcat handled HTTP DIGEST
authentication. These flaws weakened the Tomcat HTTP DIGEST authentication
implementation, subjecting it to some of the weaknesses of HTTP BASIC
authentication, for example, allowing remote attackers to perform session
replay attacks. (CVE-2011-1184)

A flaw was found in the Tomcat MemoryUserDatabase. If a runtime exception
occurred when creating a new user with a JMX client, that user's password
was logged to Tomcat log files. Note: By default, only administrators have
access to such log files. (CVE-2011-2204)

Users of Tomcat should upgrade to these updated packages, which contain
backported patches to correct these issues. Tomcat must be restarted for
this update to take effect.

SL5:
  i386
     tomcat5-5.5.23-0jpp.22.el5_7.i386.rpm
     tomcat5-admin-webapps-5.5.23-0jpp.22.el5_7.i386.rpm
     tomcat5-common-lib-5.5.23-0jpp.22.el5_7.i386.rpm
     tomcat5-debuginfo-5.5.23-0jpp.22.el5_7.i386.rpm
     tomcat5-jasper-5.5.23-0jpp.22.el5_7.i386.rpm
     tomcat5-jasper-javadoc-5.5.23-0jpp.22.el5_7.i386.rpm
     tomcat5-jsp-2.0-api-5.5.23-0jpp.22.el5_7.i386.rpm
     tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.22.el5_7.i386.rpm
     tomcat5-server-lib-5.5.23-0jpp.22.el5_7.i386.rpm
     tomcat5-servlet-2.4-api-5.5.23-0jpp.22.el5_7.i386.rpm
     tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.22.el5_7.i386.rpm
     tomcat5-webapps-5.5.23-0jpp.22.el5_7.i386.rpm
  x86_64
     tomcat5-5.5.23-0jpp.22.el5_7.x86_64.rpm
     tomcat5-admin-webapps-5.5.23-0jpp.22.el5_7.x86_64.rpm
     tomcat5-common-lib-5.5.23-0jpp.22.el5_7.x86_64.rpm
     tomcat5-debuginfo-5.5.23-0jpp.22.el5_7.x86_64.rpm
     tomcat5-jasper-5.5.23-0jpp.22.el5_7.x86_64.rpm
     tomcat5-jasper-javadoc-5.5.23-0jpp.22.el5_7.x86_64.rpm
     tomcat5-jsp-2.0-api-5.5.23-0jpp.22.el5_7.x86_64.rpm
     tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.22.el5_7.x86_64.rpm
     tomcat5-server-lib-5.5.23-0jpp.22.el5_7.x86_64.rpm
     tomcat5-servlet-2.4-api-5.5.23-0jpp.22.el5_7.x86_64.rpm
     tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.22.el5_7.x86_64.rpm
     tomcat5-webapps-5.5.23-0jpp.22.el5_7.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2