|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for tomcat8 (DLA-2279-1)|
|Summary:||The remote host is missing an update for the 'tomcat8'; package(s) announced via the DLA-2279-1 advisory.|
The remote host is missing an update for the 'tomcat8'
package(s) announced via the DLA-2279-1 advisory.
Several security vulnerabilities have been discovered in the Tomcat
servlet and JSP engine.
When using Apache Tomcat and an attacker is able to control the
contents and name of a file on the server, and b) the server is
configured to use the PersistenceManager with a FileStore, and c)
the PersistenceManager is configured with
sessionAttributeValueClassNameFilter='null' (the default unless a
SecurityManager is used) or a sufficiently lax filter to allow the
attacker provided object to be deserialized, and d) the attacker
knows the relative file path from the storage location used by
FileStore to the file the attacker has control over, then, using a
specifically crafted request, the attacker will be able to trigger
remote code execution via deserialization of the file under their
control. Note that all of conditions a) to d) must be true for the
attack to succeed.
A specially crafted sequence of HTTP/2 requests sent to Apache
Tomcat could trigger high CPU usage for several seconds. If a
sufficient number of such requests were made on concurrent HTTP/2
connections, the server could become unresponsive.
'tomcat8' package(s) on Debian Linux.
For Debian 9 stretch, these problems have been fixed in version
We recommend that you upgrade your tomcat8 packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-9484|
Debian Security Information: DSA-4727 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:0711 (Google Search)
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.