Debian LTS: Security Advisory for tomcat8 (DLA-2155-1)

Published: 2020-03-25 04:00:09
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:L/AC:M/Au:N/C:P/I:P/A:P

Summary:
The remote host is missing an update for the 'tomcat8' Linux Distribution Package(s) announced via the DLA-2155-1 advisory.

Detection Method:
Checks if a vulnerable Linux Distribution Package version is present on the target host.

Technical Details:
Tomcat8 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI Windows Registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

Affected Versions:
'tomcat8' Linux Distribution Package(s) on Debian Linux.

Recommendations:
For Debian 8 'Jessie', this problem has been fixed in version 8.0.14-1+deb8u16. We recommend that you upgrade your tomcat8 Linux Distribution Packages.

Solution Type:
Vendor Patch

Detection Type:
Linux Distribution Package

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-12418

References:

https://lists.debian.org/debian-lts-announce/2020/03/msg00029.html
https://security-tracker.debian.org/tracker/DLA-2155-1

Search
Severity
Medium
CVSS Score
4.4

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.