7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
9.1%
Package : tomcat7
Version : 7.0.28-4+deb7u6
CVE ID : CVE-2016-1240
Dawid Golunski from legalhackers.com discovered that Debian's version
of Tomcat 7 was vulnerable to a local privilege escalation. Local
attackers who have gained access to the server in the context of the
tomcat7 user through a vulnerability in a web application were able to
replace the file with a symlink to an arbitrary file.
The full advisory can be found at
http://legalhackers.com/advisories/Tomcat-Debian-based-Root-Privilege-Escalation-Exploit.txt
In addition this security update also fixes Debian bug #821391. File
ownership in /etc/tomcat7 will no longer be unconditionally overridden
on upgrade. As another precaution the file permissions of Debian
specific configuration files in /etc/tomcat7 were changed to 640 to
disallow world readable access.
For Debian 7 "Wheezy", these problems have been fixed in version
7.0.28-4+deb7u6.
We recommend that you upgrade your tomcat7 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | all | libservlet3.0-java-doc | < 7.0.28-4+deb7u6 | libservlet3.0-java-doc_7.0.28-4+deb7u6_all.deb |
Debian | 7 | all | tomcat7-examples | < 7.0.28-4+deb7u6 | tomcat7-examples_7.0.28-4+deb7u6_all.deb |
Debian | 8 | all | tomcat7 | < 7.0.56-3+deb8u4 | tomcat7_7.0.56-3+deb8u4_all.deb |
Debian | 8 | all | tomcat7-admin | < 7.0.56-3+deb8u4 | tomcat7-admin_7.0.56-3+deb8u4_all.deb |
Debian | 8 | all | libservlet3.0-java-doc | < 7.0.56-3+deb8u4 | libservlet3.0-java-doc_7.0.56-3+deb8u4_all.deb |
Debian | 8 | all | tomcat8-docs | < 8.0.14-1+deb8u3 | tomcat8-docs_8.0.14-1+deb8u3_all.deb |
Debian | 7 | all | libservlet2.5-java | < 6.0.45+dfsg-1~deb7u2 | libservlet2.5-java_6.0.45+dfsg-1~deb7u2_all.deb |
Debian | 8 | all | libservlet3.1-java-doc | < 8.0.14-1+deb8u3 | libservlet3.1-java-doc_8.0.14-1+deb8u3_all.deb |
Debian | 8 | all | tomcat8-common | < 8.0.14-1+deb8u3 | tomcat8-common_8.0.14-1+deb8u3_all.deb |
Debian | 7 | all | tomcat6-user | < 6.0.45+dfsg-1~deb7u2 | tomcat6-user_6.0.45+dfsg-1~deb7u2_all.deb |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
9.1%