Home / mailingsPDF  

[USN-3177-1] Tomcat vulnerabilities

Posted on 23 January 2017
Ubuntu Security

==========================
==========================
========================
Ubuntu Security Notice USN-3177-1
January 23, 2017

tomcat6, tomcat7, tomcat8 vulnerabilities
==========================
==========================
========================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in Tomcat.

Software Description:
- tomcat8: Servlet and JSP engine
- tomcat7: Servlet and JSP engine
- tomcat6: Servlet and JSP engine

Details:

It was discovered that the Tomcat realm implementations incorrectly handl=
ed
passwords when a username didn't exist. A remote attacker could possibly
use this issue to enumerate usernames. This issue only applied to Ubuntu
12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-0762)

Alvaro Munoz and Alexander Mirosh discovered that Tomcat incorrectly
limited use of a certain utility method. A malicious application could
possibly use this to bypass Security Manager restrictions. This issue onl=
y
applied to Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2016-5018)

It was discovered that Tomcat did not protect applications from untrusted=

data in the HTTP_PROXY environment variable. A remote attacker could
possibly use this issue to redirect outbound traffic to an arbitrary prox=
y
server. This issue only applied to Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and=

Ubuntu 16.04 LTS. (CVE-2016-5388)

It was discovered that Tomcat incorrectly controlled reading system
properties. A malicious application could possibly use this to bypass
Security Manager restrictions. This issue only applied to Ubuntu 12.04 LT=
S,
Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-6794)

It was discovered that Tomcat incorrectly controlled certain configuratio=
n
parameters. A malicious application could possibly use this to bypass
Security Manager restrictions. This issue only applied to Ubuntu 12.04 LT=
S,
Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-6796)

It was discovered that Tomcat incorrectly limited access to global JNDI
resources. A malicious application could use this to access any global JN=
DI
resource without an explicit ResourceLink. This issue only applied to
Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-6797)

Regis Leroy discovered that Tomcat incorrectly filtered certain invalid
characters from the HTTP request line. A remote attacker could possibly
use this issue to inject data into HTTP responses. (CVE-2016-6816)

Pierre Ernst discovered that the Tomcat JmxRemoteLifecycleListener did no=
t
implement a recommended fix. A remote attacker could possibly use this
issue to execute arbitrary code. (CVE-2016-8735)

It was discovered that Tomcat incorrectly handled error handling in the
send file code. A remote attacker could possibly use this issue to access=

information from other requests. (CVE-2016-8745)

Paul Szabo discovered that the Tomcat package incorrectly handled upgrade=
s
and removals. A local attacker could possibly use this issue to obtain
root privileges. (CVE-2016-9774, CVE-2016-9775)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
libtomcat8-java 8.0.37-1ubuntu0.1
tomcat8 8.0.37-1ubuntu0.1

Ubuntu 16.04 LTS:
libtomcat8-java 8.0.32-1ubuntu1.3
tomcat8 8.0.32-1ubuntu1.3

Ubuntu 14.04 LTS:
libtomcat7-java 7.0.52-1ubuntu0.8
tomcat7 7.0.52-1ubuntu0.8

Ubuntu 12.04 LTS:
libtomcat6-java 6.0.35-1ubuntu3.9
tomcat6 6.0.35-1ubuntu3.9

In general, a standard system update will make all the necessary changes.=


References:
http://www.ubuntu.com/usn/usn-3177-1
CVE-2016-0762, CVE-2016-5018, CVE-2016-5388, CVE-2016-6794,
CVE-2016-6796, CVE-2016-6797, CVE-2016-6816, CVE-2016-8735,
CVE-2016-8745, CVE-2016-9774, CVE-2016-9775

Package Information:
https://launchpad.net/ubuntu/+source/tomcat8/8.0.37-1ubuntu0.1
https://launchpad.net/ubuntu/+source/tomcat8/8.0.32-1ubuntu1.3
https://launchpad.net/ubuntu/+source/tomcat7/7.0.52-1ubuntu0.8
https://launchpad.net/ubuntu/+source/tomcat6/6.0.35-1ubuntu3.9



--9JTOAqVxK01qrioqDhuKBuO5tkQjcENe1--

 

TOP