Thursday, June 25, 2015

USN-2654-1: Tomcat vulnerabilities

Ubuntu Security Notice USN-2654-1

25th June, 2015

tomcat7 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Tomcat.

Software description

  • tomcat7 - Servlet and JSP engine

Details

It was discovered that the Tomcat XML parser incorrectly handled XML
External Entities (XXE). A remote attacker could possibly use this issue to
read arbitrary files. This issue only affected Ubuntu 14.04 LTS.
(CVE-2014-0119)

It was discovered that Tomcat incorrectly handled data with malformed
chunked transfer coding. A remote attacker could possibly use this issue to
conduct HTTP request smuggling attacks, or cause Tomcat to consume
resources, resulting in a denial of service. This issue only affected
Ubuntu 14.04 LTS. (CVE-2014-0227)

It was discovered that Tomcat incorrectly handled HTTP responses occurring
before the entire request body was finished being read. A remote attacker
could possibly use this issue to cause memory consumption, resulting in a
denial of service. This issue only affected Ubuntu 14.04 LTS.
(CVE-2014-0230)

It was discovered that the Tomcat Expression Language (EL) implementation
incorrectly handled accessible interfaces implemented by inaccessible
classes. An attacker could possibly use this issue to bypass a
SecurityManager protection mechanism. (CVE-2014-7810)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 15.04:
libtomcat7-java 7.0.56-2ubuntu0.1
Ubuntu 14.10:
libtomcat7-java 7.0.55-1ubuntu0.2
Ubuntu 14.04 LTS:
libtomcat7-java 7.0.52-1ubuntu0.3

To update your system, please follow these instructions: http://ift.tt/17VXqjU.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-0119, CVE-2014-0227, CVE-2014-0230, CVE-2014-7810



from Ubuntu Security Notices http://ift.tt/1QRySjv

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.