CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
100.0%
CentOS Errata and Security Advisory CESA-2017:3080
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
A vulnerability was discovered in Tomcat’s handling of pipelined requests when “Sendfile” was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647)
A vulnerability was discovered in the error page mechanism in Tomcat’s DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664)
Two vulnerabilities were discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615, CVE-2017-12617)
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2017-October/084772.html
Affected packages:
tomcat6
tomcat6-admin-webapps
tomcat6-docs-webapp
tomcat6-el-2.1-api
tomcat6-javadoc
tomcat6-jsp-2.1-api
tomcat6-lib
tomcat6-servlet-2.5-api
tomcat6-webapps
Upstream details at:
https://access.redhat.com/errata/RHSA-2017:3080
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | noarch | tomcat6 | < 6.0.24-111.el6_9 | tomcat6-6.0.24-111.el6_9.noarch.rpm |
CentOS | 6 | noarch | tomcat6-admin-webapps | < 6.0.24-111.el6_9 | tomcat6-admin-webapps-6.0.24-111.el6_9.noarch.rpm |
CentOS | 6 | noarch | tomcat6-docs-webapp | < 6.0.24-111.el6_9 | tomcat6-docs-webapp-6.0.24-111.el6_9.noarch.rpm |
CentOS | 6 | noarch | tomcat6-el-2.1-api | < 6.0.24-111.el6_9 | tomcat6-el-2.1-api-6.0.24-111.el6_9.noarch.rpm |
CentOS | 6 | noarch | tomcat6-javadoc | < 6.0.24-111.el6_9 | tomcat6-javadoc-6.0.24-111.el6_9.noarch.rpm |
CentOS | 6 | noarch | tomcat6-jsp-2.1-api | < 6.0.24-111.el6_9 | tomcat6-jsp-2.1-api-6.0.24-111.el6_9.noarch.rpm |
CentOS | 6 | noarch | tomcat6-lib | < 6.0.24-111.el6_9 | tomcat6-lib-6.0.24-111.el6_9.noarch.rpm |
CentOS | 6 | noarch | tomcat6-servlet-2.5-api | < 6.0.24-111.el6_9 | tomcat6-servlet-2.5-api-6.0.24-111.el6_9.noarch.rpm |
CentOS | 6 | noarch | tomcat6-webapps | < 6.0.24-111.el6_9 | tomcat6-webapps-6.0.24-111.el6_9.noarch.rpm |
CentOS | 6 | noarch | tomcat6 | < 6.0.24-111.el6_9 | tomcat6-6.0.24-111.el6_9.noarch.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
100.0%