Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Apache Tomcat
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Apache Tomcat
ID: USN-3519-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 17.04
Datum: Mo, 8. Januar 2018, 22:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7674
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5648
Applikationen: Apache Tomcat

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============2072409858056750046==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="gxi5jbw5fWNFPIuhCjKh3XWW6mO3RWuuK"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--gxi5jbw5fWNFPIuhCjKh3XWW6mO3RWuuK
Content-Type: multipart/mixed;
boundary="KNdBghqEt6R60UpbM83hPaiIjxk4b32Jn";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <f3dfcb1e-98ae-0688-1e6e-14243966c9c8@canonical.com>
Subject: [USN-3519-1] Tomcat vulnerabilities

--KNdBghqEt6R60UpbM83hPaiIjxk4b32Jn
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3519-1
January 08, 2018

tomcat7, tomcat8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Tomcat.

Software Description:
- tomcat8: Servlet and JSP engine
- tomcat7: Servlet and JSP engine

Details:

It was discovered that Tomcat incorrectly handled certain pipelined
requests when sendfile was used. A remote attacker could use this issue to
obtain wrong responses possibly containing sensitive information.
(CVE-2017-5647)

It was discovered that Tomcat incorrectly used the appropriate facade
object. A malicious application could possibly use this to bypass Security
Manager restrictions. (CVE-2017-5648)

It was discovered that Tomcat incorrectly handled error pages. A remote
attacker could possibly use this issue to replace or remove the custom
error page. (CVE-2017-5664)

It was discovered that Tomcat incorrectly handled the CORS filter. A remote
attacker could possibly use this issue to perform cache poisoning.
(CVE-2017-7674)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
libtomcat8-java 8.0.38-2ubuntu2.2
tomcat8 8.0.38-2ubuntu2.2

Ubuntu 16.04 LTS:
libtomcat8-java 8.0.32-1ubuntu1.5
tomcat8 8.0.32-1ubuntu1.5

Ubuntu 14.04 LTS:
libtomcat7-java 7.0.52-1ubuntu0.13
tomcat7 7.0.52-1ubuntu0.13

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3519-1
CVE-2017-5647, CVE-2017-5648, CVE-2017-5664, CVE-2017-7674

Package Information:
https://launchpad.net/ubuntu/+source/tomcat8/8.0.38-2ubuntu2.2
https://launchpad.net/ubuntu/+source/tomcat8/8.0.32-1ubuntu1.5
https://launchpad.net/ubuntu/+source/tomcat7/7.0.52-1ubuntu0.13



--KNdBghqEt6R60UpbM83hPaiIjxk4b32Jn--

--gxi5jbw5fWNFPIuhCjKh3XWW6mO3RWuuK
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=Dxue
-----END PGP SIGNATURE-----

--gxi5jbw5fWNFPIuhCjKh3XWW6mO3RWuuK--


--===============2072409858056750046==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============2072409858056750046==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung