Lucene search

K
amazonAmazonALAS-2017-796
HistoryFeb 14, 2017 - 12:00 p.m.

Medium: tomcat7, tomcat8

2017-02-1412:00:00
alas.aws.amazon.com
19

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.006 Low

EPSS

Percentile

79.4%

Issue Overview:

A bug in the error handling of the send file code for the NIO HTTP connector resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body.

Affected Packages:

tomcat7, tomcat8

Issue Correction:
Run yum update tomcat7 to update your system.
Run yum update tomcat8 to update your system.

New Packages:

noarch:  
    tomcat8-jsp-2.3-api-8.0.41-1.69.amzn1.noarch  
    tomcat8-javadoc-8.0.41-1.69.amzn1.noarch  
    tomcat8-webapps-8.0.41-1.69.amzn1.noarch  
    tomcat8-lib-8.0.41-1.69.amzn1.noarch  
    tomcat8-log4j-8.0.41-1.69.amzn1.noarch  
    tomcat8-servlet-3.1-api-8.0.41-1.69.amzn1.noarch  
    tomcat8-el-3.0-api-8.0.41-1.69.amzn1.noarch  
    tomcat8-admin-webapps-8.0.41-1.69.amzn1.noarch  
    tomcat8-8.0.41-1.69.amzn1.noarch  
    tomcat8-docs-webapp-8.0.41-1.69.amzn1.noarch  
    tomcat7-lib-7.0.75-1.25.amzn1.noarch  
    tomcat7-log4j-7.0.75-1.25.amzn1.noarch  
    tomcat7-webapps-7.0.75-1.25.amzn1.noarch  
    tomcat7-javadoc-7.0.75-1.25.amzn1.noarch  
    tomcat7-el-2.2-api-7.0.75-1.25.amzn1.noarch  
    tomcat7-7.0.75-1.25.amzn1.noarch  
    tomcat7-admin-webapps-7.0.75-1.25.amzn1.noarch  
    tomcat7-docs-webapp-7.0.75-1.25.amzn1.noarch  
    tomcat7-jsp-2.2-api-7.0.75-1.25.amzn1.noarch  
    tomcat7-servlet-3.0-api-7.0.75-1.25.amzn1.noarch  
  
src:  
    tomcat8-8.0.41-1.69.amzn1.src  
    tomcat7-7.0.75-1.25.amzn1.src  

Additional References

Red Hat: CVE-2016-8745

Mitre: CVE-2016-8745

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.006 Low

EPSS

Percentile

79.4%