[Trisquel-security] [USN-2130-1] Tomcat vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Thu Mar 6 14:58:55 CET 2014


==========================================================================
Ubuntu Security Notice USN-2130-1
March 06, 2014

tomcat6, tomcat7 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.10
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in Tomcat.

Software Description:
- tomcat7: Servlet and JSP engine
- tomcat6: Servlet and JSP engine

Details:

It was discovered that Tomcat incorrectly handled certain inconsistent
HTTP headers. A remote attacker could possibly use this flaw to conduct
request smuggling attacks. (CVE-2013-4286)

It was discovered that Tomcat incorrectly handled certain requests
submitted using chunked transfer encoding. A remote attacker could use this
flaw to cause the Tomcat server to stop responding, resulting in a denial
of service. (CVE-2013-4322)

It was discovered that Tomcat incorrectly applied the disableURLRewriting
setting when handling a session id in a URL. A remote attacker could
possibly use this flaw to conduct session fixation attacks. This issue
only applied to Ubuntu 12.04 LTS. (CVE-2014-0033)

It was discovered that Tomcat incorrectly handled malformed Content-Type
headers and multipart requests. A remote attacker could use this flaw to
cause the Tomcat server to stop responding, resulting in a denial of
service. This issue only applied to Ubuntu 12.10 and Ubuntu 13.10.
(CVE-2014-0050)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.10:
  libtomcat7-java                 7.0.42-1ubuntu0.1

Ubuntu 12.10:
  libtomcat7-java                 7.0.30-0ubuntu1.3

Ubuntu 12.04 LTS:
  libtomcat6-java                 6.0.35-1ubuntu3.4

Ubuntu 10.04 LTS:
  libtomcat6-java                 6.0.24-2ubuntu1.15

In general, a standard system update will make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-2130-1
  CVE-2013-4286, CVE-2013-4322, CVE-2014-0033, CVE-2014-0050

Package Information:
  https://launchpad.net/ubuntu/+source/tomcat7/7.0.42-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/tomcat7/7.0.30-0ubuntu1.3
  https://launchpad.net/ubuntu/+source/tomcat6/6.0.35-1ubuntu3.4
  https://launchpad.net/ubuntu/+source/tomcat6/6.0.24-2ubuntu1.15


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <http://listas.trisquel.info/pipermail/trisquel-security/attachments/20140306/3676c78c/attachment.pgp>
-------------- next part --------------
-- 
ubuntu-security-announce mailing list
ubuntu-security-announce at lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


More information about the Trisquel-security mailing list