==========================================================================
Ubuntu Security Notice USN-2302-1
July 30, 2014
tomcat6, tomcat7 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in Tomcat.
Software Description:
– tomcat7: Servlet and JSP engine
– tomcat6: Servlet and JSP engine
Details:
David Jorm discovered that Tomcat incorrectly handled certain requests
submitted using chunked transfer encoding. A remote attacker could use this
flaw to cause the Tomcat server to consume resources, resulting in a denial
of service. (CVE-2014-0075)
It was discovered that Tomcat did not properly restrict XSLT stylesheets.
An attacker could use this issue with a crafted web application to bypass
security-manager restrictions and read arbitrary files. (CVE-2014-0096)
It was discovered that Tomcat incorrectly handled certain Content-Length
headers. A remote attacker could use this flaw in configurations where
Tomcat is behind a reverse proxy to perform HTTP request smuggling attacks.
(CVE-2014-0099)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libtomcat7-java 7.0.52-1ubuntu0.1
Ubuntu 12.04 LTS:
libtomcat6-java 6.0.35-1ubuntu3.5
Ubuntu 10.04 LTS:
libtomcat6-java 6.0.24-2ubuntu1.16
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2302-1
CVE-2014-0075, CVE-2014-0096, CVE-2014-0099
Package Information:
https://launchpad.net/ubuntu/+source/tomcat7/7.0.52-1ubuntu0.1
https://launchpad.net/ubuntu/+source/tomcat6/6.0.35-1ubuntu3.5
https://launchpad.net/ubuntu/+source/tomcat6/6.0.24-2ubuntu1.16
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=uTi/
—–END PGP SIGNATURE—–
—