Lucene search

K
amazonAmazonALAS-2022-1627
HistoryJul 28, 2022 - 8:39 p.m.

Important: tomcat8

2022-07-2820:39:00
alas.aws.amazon.com
21

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.03 Low

EPSS

Percentile

90.8%

Issue Overview:

A flaw was found in the tomcat package. When a web application sends a WebSocket message concurrently with the WebSocket connection closing, the application may continue to use the socket after it has been closed. In this case, the error handling triggered could cause the pooled object to be placed in the pool twice. This issue results in subsequent connections using the same object concurrently, which causes data to be potentially returned to the wrong user or application stability issues. (CVE-2022-25762)

The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks. (CVE-2022-29885)

Affected Packages:

tomcat8

Issue Correction:
Run yum update tomcat8 to update your system.

New Packages:

noarch:  
    tomcat8-jsp-2.3-api-8.5.81-1.91.amzn1.noarch  
    tomcat8-javadoc-8.5.81-1.91.amzn1.noarch  
    tomcat8-lib-8.5.81-1.91.amzn1.noarch  
    tomcat8-webapps-8.5.81-1.91.amzn1.noarch  
    tomcat8-8.5.81-1.91.amzn1.noarch  
    tomcat8-el-3.0-api-8.5.81-1.91.amzn1.noarch  
    tomcat8-log4j-8.5.81-1.91.amzn1.noarch  
    tomcat8-docs-webapp-8.5.81-1.91.amzn1.noarch  
    tomcat8-servlet-3.1-api-8.5.81-1.91.amzn1.noarch  
    tomcat8-admin-webapps-8.5.81-1.91.amzn1.noarch  
  
src:  
    tomcat8-8.5.81-1.91.amzn1.src  

Additional References

Red Hat: CVE-2022-25762, CVE-2022-29885

Mitre: CVE-2022-25762, CVE-2022-29885

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.03 Low

EPSS

Percentile

90.8%