drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in tomcat7
Name: |
Mehrere Probleme in tomcat7 |
|
ID: |
DSA-2897-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian wheezy, Debian jessie |
|
Datum: |
Di, 8. April 2014, 22:37 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2067
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2071
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050 |
|
Applikationen: |
Apache Tomcat |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- ------------------------------------------------------------------------- Debian Security Advisory DSA-2897-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff April 08, 2014 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : tomcat7 CVE ID : CVE-2013-2067 CVE-2013-2071 CVE-2013-4286 CVE-2013-4322 CVE-2014-0050
Multiple security issues were found in the Tomcat servlet and JSP engine:
CVE-2013-2067
FORM authentication associates the most recent request requiring authentication with the current session. By repeatedly sending a request for an authenticated resource while the victim is completing the login form, an attacker could inject a request that would be executed using the victim's credentials.
CVE-2013-2071
A runtime exception in AsyncListener.onComplete() prevents the request from being recycled. This may expose elements of a previous request to a current request.
CVE-2013-4286
Reject requests with multiple content-length headers or with a content-length header when chunked encoding is being used.
CVE-2013-4322
When processing a request submitted using the chunked transfer encoding, Tomcat ignored but did not limit any extensions that were included. This allows a client to perform a limited denial of service. by streaming an unlimited amount of data to the server.
CVE-2014-0050
Multipart requests with a malformed Content-Type header could trigger an infinite loop causing a denial of service.
For the stable distribution (wheezy), these problems have been fixed in version 7.0.28-4+deb7u1.
For the testing distribution (jessie), these problems have been fixed in version 7.0.52-1.
For the unstable distribution (sid), these problems have been fixed in version 7.0.52-1.
We recommend that you upgrade your tomcat7 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBAgAGBQJTRD6+AAoJEBDCk7bDfE42EiwQALiEq9OFVnW5Wf6HP4dWFvpc OsVvWZweakr5gqXmsQRqxXbDSzFhu3w88ntLhoKjQ5aH785V0hb70msEqxzAH8Hq idxUug0fjsxD0+YgLSSRnloOxpQC0GpLNBt55/ZFiVFctjlxEbKYOsfcF7HSqm5t 1ROWW8AyYwnoJq0KSeMwxwKFvZ+x4w5PrvOtqB/yzJYrS+Zom5iDY+eEXh47CePV J/2FVlff0TyQt3RaRR+c6eqnYRTsLoF22MXS3BXKOJOxcmdBpWjS75pj01FcPsTU tkOAyYu7e180hnsBDAA4R4w2LdxJOOty87GkucXH2PXBndhkmk0acyGeaBlgW2bM kKqd0Xp5av4TpgecsAo0/hblwXQ18lNHJB82u/d80/zaWPf6+bAizMsCCHwp8uY7 71m2h1doKiuuZe6Dd1Tluq5OzyN0eiwwnFfY3PwYf+TfuH/olw1R99R3/wmMieQ7 t/EaJZgJFnya2iKrkI/S9di2MVnOijT9lmvp7qaNYSWCS9QRtyy0CWEw45z5884R QQFl0Or5W+WcWj5cs9FR2mXJ3PRQ5sRGwe6Ng5OYhuct6gZWj9vZhZ/CjxyCG9Fm UPLWClmWh8V6HPKCovBLM5KK9lLX+KUnadO75+2E30H2UmgZLcj/O/CgFWYpw/N9 BR/VhLvF6TzVyMJOtk8E =uwle -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: https://lists.debian.org/20140408182514.GA2630@pisco.westfalen.local
|
|
|
|