Lucene search

K
amazonAmazonALAS-2017-862
HistoryAug 03, 2017 - 6:49 p.m.

Important: tomcat8

2017-08-0318:49:00
alas.aws.amazon.com
21

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.009 Low

EPSS

Percentile

82.4%

Issue Overview:

Security constrained bypass in error page mechanism:
A vulnerability was discovered in the error page mechanism in Tomcat’s DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664)

The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances. (CVE-2017-7674)

Affected Packages:

tomcat8

Issue Correction:
Run yum update tomcat8 to update your system.

New Packages:

noarch:  
    tomcat8-webapps-8.0.45-1.72.amzn1.noarch  
    tomcat8-docs-webapp-8.0.45-1.72.amzn1.noarch  
    tomcat8-8.0.45-1.72.amzn1.noarch  
    tomcat8-javadoc-8.0.45-1.72.amzn1.noarch  
    tomcat8-lib-8.0.45-1.72.amzn1.noarch  
    tomcat8-servlet-3.1-api-8.0.45-1.72.amzn1.noarch  
    tomcat8-admin-webapps-8.0.45-1.72.amzn1.noarch  
    tomcat8-el-3.0-api-8.0.45-1.72.amzn1.noarch  
    tomcat8-jsp-2.3-api-8.0.45-1.72.amzn1.noarch  
    tomcat8-log4j-8.0.45-1.72.amzn1.noarch  
  
src:  
    tomcat8-8.0.45-1.72.amzn1.src  

Additional References

Red Hat: CVE-2017-5664, CVE-2017-7674

Mitre: CVE-2017-5664, CVE-2017-7674

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.009 Low

EPSS

Percentile

82.4%