Debian Security Advisory DSA 3842-1 (tomcat7 - security update)

Published: 2017-05-02 22:00:00
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N

Solution Type:
Vendor Patch

Detection Type:
Linux Distribution Package

Affected Versions:
tomcat7 on Debian Linux

Recommendations:
For the stable distribution (jessie), these problems have been fixed in version 7.0.56-3+deb8u10. For the upcoming stable (stretch) and unstable (sid) distributions, these problems have been fixed in version 7.0.72-3. We recommend that you upgrade your tomcat7 Linux Distribution Packages.

Summary:
Two vulnerabilities were discovered in tomcat7, a servlet and JSP engine. CVE-2017-5647 Pipelined requests were processed incorrectly, which could result in some responses appearing to be sent for the wrong request. CVE-2017-5648 Some application listeners calls were issued against the wrong objects, allowing untrusted applications running under a SecurityManager to bypass that protection mechanism and access or modify information associated with other web applications.

Detection Method:
This check tests the installed software version using the apt Linux Distribution Package manager.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2017-5647
https://nvd.nist.gov/vuln/detail/CVE-2017-5648

References:

http://www.debian.org/security/2017/dsa-3842.html

Search
Severity
Medium
CVSS Score
6.4

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.