U radu programskog paketa tomcat6 učeno je više sigurnosnih propusta koje udaljeni napadač može iskoristiti za DoS napad, proizvoljno pokretanje skriptnog i HTML koda, zaobilaženje ograničenja, dobivanje većih privilegija u sustavu te izmjenu podataka.
Paket: | Apache Tomcat 6.x |
Operacijski sustavi: | Fedora 14, Fedora 15 |
Kritičnost: | 6.5 |
Problem: | neodgovarajuća provjera ulaznih podataka, pogreška u programskoj komponenti, XSS |
Iskorištavanje: | lokalno/udaljeno |
Posljedica: | izmjena podataka, otkrivanje osjetljivih informacija, umetanje HTML i skriptnog koda, uskraćivanje usluga (DoS), zaobilaženje postavljenih ograničenja |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2011-3190, CVE-2011-2526, CVE-2011-2204, CVE-2011-0534, CVE-2011-0013, CVE-2010-3718 |
Izvorni ID preporuke: | FEDORA-2011-13457 |
Izvor: | Fedora |
Problem: | |
Sigurnosne ranjivosti su posljedica pogrešaka u implementaciji određenih "AJP protocol" priključaka, pogrešnog rukovanja nekim ulaznim zahtjevima, višestrukih XSS (eng. Cross-Site Scripting) ranjivosti, itd. |
|
Posljedica: | |
Zloćudni korisnik navedene ranjivosti može iskoristiti za XSS napad, zaobilaženje ograničenja, povećanje ovlasti, izmjenu podataka te napad uskraćivanjem usluga. |
|
Rješenje: | |
Svim se korisnicima navedenog programskog paketa, u svrhu zaštite sigurnosti, savjetuje nadogradnja na novije inačice. |
Izvorni tekst preporuke
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-13457
2011-09-29 01:05:56
--------------------------------------------------------------------------------
Name : tomcat6
Product : Fedora 14
Version : 6.0.26
Release : 27.fc14
URL : http://tomcat.apache.org/
Summary : Apache Servlet/JSP Engine, RI for Servlet 2.5/JSP 2.1 API
Description :
Tomcat is the servlet container that is used in the official Reference
Implementation for the Java Servlet and JavaServer Pages technologies.
The Java Servlet and JavaServer Pages specifications are developed by
Sun under the Java Community Process.
Tomcat is developed in an open and participatory environment and
released under the Apache Software License version 2.0. Tomcat is intended
to be a collaboration of the best-of-breed developers from around the world.
--------------------------------------------------------------------------------
Update Information:
Fixes for:
CVE-2011-3190 - authentication bypass and information disclosure
CVE-2011-2526 - send file validation
CVE-2011-2204 - password disclosure vulnerability
JAVA_HOME setting in tomcat6.conf
CVE-2011-0534, CVE-2011-0013, CVE-2010-3718
--------------------------------------------------------------------------------
ChangeLog:
* Tue Sep 27 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-27
- Resolves CVE-2011-3190 rhbz 738502
* Mon Sep 26 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-26
- Resolves rhbz 640134 - JAVA_HOME setting
* Fri Sep 23 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-25
- Resolves CVE-2011-2526 rhbz 721087 sendfile validation and
- validation
* Wed Aug 10 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-24
- Resolves changed java R and BR so it does not specify a version
* Fri Jul 1 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-23
- Resolves rhbz 669969 - BasicDataSourceFactory in sysconfig
* Tue Jun 28 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-22
- Resolves rhbz 717016 CVE-2011-2204
* Sun May 1 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> O:6.0.26-21
* Resolves rhbz 701037 - bad symbolic link to tomcat-juli
* Thu Apr 14 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-20
* Applied CVE-2010-3718, CVE-2011-0013, CVE-2011-0534
* Thu Feb 17 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-19
- Reversed changes in tomcat6.init so tomcat6.conf is read before
- the system configuration
* Thu Feb 3 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-18
- Resolves: rhbz 647601 - JDK Double.parseDouble DoS
* Mon Jan 17 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-17
- Resolves: rhbz# 669969 - tomcat.conf sets
javax.sql.DataSource.Factory=org.apache.commons.dbcp.BasicDataSourceFactory" as
the default.
- Resolves issues running multiple instances on a single host. Logging
- directory points to ${CATALINA_HOME}/logs/
* Thu Dec 2 2010 Stanislav Ochotnicky <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-16
- Fix log4j symlink (Resolves rhbz#654660)
* Wed Dec 1 2010 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-15
- rhbz 640686 To avoid loss, appdir, confdir, and libdir are
- preserved in /var/tmp at pre and copied back in place and
- the tmp copies removed during posttrans.
* Thu Oct 14 2010 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-14
- Resolves rhbz#640686 - Upgrade of tomcat6 wipes out directories
- WARNING - Back up all files that need to be preserved before
- package update or uninstall - WARNING
* Tue Oct 12 2010 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-13
- Resolves numerous rhbz: tomcat user shell, commons-xxxx-tomcat5
- libs have been removed and replaced with jakarta-commons-xxxx,
- directory permissions.
* Thu Oct 7 2010 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-12
- resolves rhbz#641102 - tomcat user requires login shell
* Tue Oct 5 2010 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-11
- Returned to using ant-trax because f14 is not using ant-nodeps-1.8
* Mon Oct 4 2010 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-10
- ant-nodeps is breaking the build. Put ant-nodeps on the
- OPT_JAR_LIST
* Fri Oct 1 2010 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.26-9
- Resolves rhbz#575341 - Additionally created instances of Tomcat
- are broken
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #738502 - CVE-2011-3190 tomcat: authentication bypass and
information disclosure [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=738502
[ 2 ] Bug #640134 - Issues with setting JAVA_HOME
https://bugzilla.redhat.com/show_bug.cgi?id=640134
[ 3 ] Bug #721087 - CVE-2011-2526 tomcat5, tomcat6: Certain server files
exposure and JVM crash via crafted web application running under security
manager [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=721087
[ 4 ] Bug #717016 - CVE-2011-2204 tomcat: password disclosure vulnerability
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=717016
[ 5 ] Bug #701037 - bad symbolic links created for tomcat-juli jar
https://bugzilla.redhat.com/show_bug.cgi?id=701037
[ 6 ] Bug #675794 - CVE-2011-0013 CVE-2010-3718 CVE-2011-0534 tomcat6 various
flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=675794
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update tomcat6' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-13456
2011-09-29 01:05:53
--------------------------------------------------------------------------------
Name : tomcat6
Product : Fedora 15
Version : 6.0.32
Release : 8.fc15
URL : http://tomcat.apache.org/
Summary : Apache Servlet/JSP Engine, RI for Servlet 2.5/JSP 2.1 API
Description :
Tomcat is the servlet container that is used in the official Reference
Implementation for the Java Servlet and JavaServer Pages technologies.
The Java Servlet and JavaServer Pages specifications are developed by
Sun under the Java Community Process.
Tomcat is developed in an open and participatory environment and
released under the Apache Software License version 2.0. Tomcat is intended
to be a collaboration of the best-of-breed developers from around the world.
--------------------------------------------------------------------------------
Update Information:
Fix for CVE-2011-3190
This release is the first using a systemd unit file. SystemV files are packaged
separately. During this transition users may experience this error:
"error reading information on service tomcat6: No such file or directory"
The error occurs because there is no tomcat service to delete. It has been
tested, is harmless, and can be ignored.
Resolves: regression in /usr/sbin/tomcat6 (Additionally Created Instances of
Tomcat are broken)
Bug fix
669969 - dbcp configuration
CVE-2011-2204
Added missing commons-pool to lib
reverted eclipse osgi manifests to the preceding version.
--------------------------------------------------------------------------------
ChangeLog:
* Tue Sep 27 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.32-8
- Resolves: CVE-2011-3190 rhbz 738502
* Thu Aug 11 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.32-7
- Resolves: change java R and BR so it does not specify a
- version.
* Wed Jul 27 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.32-6
- Resolves: CVE-2011-2526
* Tue Jul 5 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.32-5
- Resolves rhbz 677414 - change %preun so erasing work
- and temp dirs occurs only on removal. Add recreation of
- tempdir and workdir only on update in %posttrans.
* Fri Jul 1 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 0:6.0.32-4
- Resolves thbz 669969 - DataSourceFactory config in sysconfig
* Tue Jun 28 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0:6.0.32-3
- Resolves CVE-2011-2204 rhbz 717016
- Resolves dangling symlink to log4j
- Resolves commons-pool missing from lib
* Wed May 18 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0:6.0.32-2
- Reverted OSGI manifests to the original version. The new
- copies were breaking users' eclipse
* Mon May 16 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0:6.0.32-1
- Updated to tomcat6.0.32 to capture upstream bzs and security fixes
- Resolved bz 700581 - CATALINA_PID not honored
- Resolved bz 701030 - tomcat6/bin not owned by rpm
- Updated OSGI manifests
* Sun May 1 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0:6.0.30-8
- Resolve: rhbz 701038 - nologin regression in f15
* Mon Apr 11 2011 David Knox <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0:6.0.30-7
- Resolve: rhbz 680447 - finished fixing initscript sourcing error
- Resolve: rhbz 693292 - manager app doesn't work (directory permissions)
- Resolve: rhbz 677414 - directory permissions
- Init script uses $logdir/initd.out, wrapper uses catalina.out
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #717013 - CVE-2011-2204 tomcat: password disclosure vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=717013
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update tomcat6' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke