blob: 38d1378b7f314113fb51c3ffe79d4cef3924c28d [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200804-10">
<title>Tomcat: Multiple vulnerabilities</title>
Multiple vulnerabilities in Tomcat may lead to local file overwriting,
session hijacking or information disclosure.
<product type="ebuild">tomcat</product>
<announced>April 10, 2008</announced>
<revised>May 28, 2009: 02</revised>
<access>local, remote</access>
<package name="www-servers/tomcat" auto="yes" arch="*">
<unaffected range="rge">5.5.26</unaffected>
<unaffected range="ge">6.0.16</unaffected>
<unaffected range="rge">5.5.27</unaffected>
<vulnerable range="lt">6.0.16</vulnerable>
Tomcat is the Apache Jakarta Project's official implementation of Java
Servlets and Java Server Pages.
The following vulnerabilities were reported:
<li>Delian Krustev discovered that the JULI logging component does not
properly enforce access restrictions, allowing web application to add
or overwrite files (CVE-2007-5342).</li>
When the native APR connector is used, Tomcat does not properly handle
an empty request to the SSL port, which allows remote attackers to
trigger handling of a duplicate copy of one of the recent requests
If the processing or parameters is interrupted, i.e. by an exception,
then it is possible for the parameters to be processed as part of later
request (CVE-2008-0002).</li>
An absolute path traversal vulnerability exists due to the way that
WebDAV write requests are handled (CVE-2007-5461).</li>
Tomcat does not properly handle double quote (") characters or %5C
(encoded backslash) sequences in a cookie value, which might cause
sensitive information such as session IDs to be leaked to remote
attackers and enable session hijacking attacks
<impact type="normal">
These vulnerabilities can be exploited by:
a malicious web application to add or overwrite files with the
permissions of the user running Tomcat.
a remote attacker to conduct session hijacking or disclose sensitive
There is no known workaround at this time.
All Tomcat 5.5.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-servers/tomcat-5.5.26&quot;</code>
All Tomcat 6.0.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-servers/tomcat-6.0.16&quot;</code>
<uri link="">CVE-2007-5333</uri>
<uri link="">CVE-2007-5342</uri>
<uri link="">CVE-2007-5461</uri>
<uri link="">CVE-2007-6286</uri>
<uri link="">CVE-2008-0002</uri>
<metadata tag="requester" timestamp="Fri, 21 Mar 2008 02:25:49 +0000">
<metadata tag="submitter" timestamp="Fri, 21 Mar 2008 18:05:04 +0000">
<metadata tag="bugReady" timestamp="Fri, 04 Apr 2008 15:09:23 +0000">