English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75516 CVE descriptions
and 39786 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69374
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-1097-1 (tomcat6)
Summary:Ubuntu USN-1097-1 (tomcat6)
Description:The remote host is missing an update to tomcat6
announced via advisory USN-1097-1.

Details follow:

It was discovered that the Tomcat SecurityManager did not properly restrict
the working directory. An attacker could use this flaw to read or write
files outside of the intended working directory. (CVE-2010-3718)

It was discovered that Tomcat did not properly escape certain parameters in
the Manager application which could result in browsers becoming vulnerable
to cross-site scripting attacks when processing the output. With cross-site
scripting vulnerabilities, if a user were tricked into viewing server
output during a crafted server request, a remote attacker could exploit
this to modify the contents, or steal confidential data (such as
passwords), within the same domain. (CVE-2011-0013)

It was discovered that Tomcat incorrectly enforced the maxHttpHeaderSize
limit in certain configurations. A remote attacker could use this flaw to
cause Tomcat to consume all available memory, resulting in a denial of
service. (CVE-2011-0534)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.10:
libtomcat6-java 6.0.20-2ubuntu2.4
tomcat6-admin 6.0.20-2ubuntu2.4

Ubuntu 10.04 LTS:
libtomcat6-java 6.0.24-2ubuntu1.7
tomcat6-admin 6.0.24-2ubuntu1.7

Ubuntu 10.10:
libtomcat6-java 6.0.28-2ubuntu1.2
tomcat6-admin 6.0.28-2ubuntu1.2

In general, a standard system update will make all the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-1097-1

Risk factor : Medium
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-3718
Bugtraq: 20110205 [SECURITY] CVE-2010-3718 Apache Tomcat Local bypass of security manger file permissions (Google Search)
http://www.securityfocus.com/archive/1/archive/1/516211/100/0/threaded
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
Debian Security Information: DSA-2160 (Google Search)
http://www.debian.org/security/2011/dsa-2160
HPdes Security Advisory: HPSBUX02725
http://marc.info/?l=bugtraq&m=132215163318824&w=2
HPdes Security Advisory: SSRT100627
HPdes Security Advisory: HPSBUX02860
http://marc.info/?l=bugtraq&m=136485229118404&w=2
HPdes Security Advisory: SSRT101146
HPdes Security Advisory: HPSBST02955
http://marc.info/?l=bugtraq&m=139344343412337&w=2
http://www.mandriva.com/security/advisories?name=MDVSA-2011:030
http://www.redhat.com/support/errata/RHSA-2011-0791.html
http://www.redhat.com/support/errata/RHSA-2011-0896.html
http://www.redhat.com/support/errata/RHSA-2011-0897.html
http://www.redhat.com/support/errata/RHSA-2011-1845.html
SuSE Security Announcement: SUSE-SR:2011:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
BugTraq ID: 46177
http://www.securityfocus.com/bid/46177
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12517
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:13969
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:19379
http://www.securitytracker.com/id?1025025
http://secunia.com/advisories/43192
http://secunia.com/advisories/45022
http://secunia.com/advisories/57126
http://securityreason.com/securityalert/8072
XForce ISS Database: tomcat-servletcontect-sec-bypass(65159)
http://xforce.iss.net/xforce/xfdb/65159
Common Vulnerability Exposure (CVE) ID: CVE-2011-0013
Bugtraq: 20110205 [SECURITY] CVE-2011-0013 Apache Tomcat Manager XSS vulnerability (Google Search)
http://www.securityfocus.com/archive/1/516209/30/90/threaded
https://bugzilla.redhat.com/show_bug.cgi?id=675786
BugTraq ID: 46174
http://www.securityfocus.com/bid/46174
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12878
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14945
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:19269
http://www.securitytracker.com/id?1025026
http://securityreason.com/securityalert/8093
http://www.vupen.com/english/advisories/2011/0376
Common Vulnerability Exposure (CVE) ID: CVE-2011-0534
Bugtraq: 20110205 [SECURITY] CVE-2011-0534 Apache Tomcat DoS vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/516214/100/0/threaded
BugTraq ID: 46164
http://www.securityfocus.com/bid/46164
http://osvdb.org/70809
http://www.securitytracker.com/id?1025027
http://securityreason.com/securityalert/8074
http://www.vupen.com/english/advisories/2011/0293
XForce ISS Database: tomcat-nio-connector-dos(65162)
http://xforce.iss.net/xforce/xfdb/65162
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 39786 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.