CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
82.7%
Package : tomcat7
Version : 7.0.28-4+deb7u14
CVE ID : CVE-2017-5664
Debian Bug : 864447
The error page mechanism of the Java Servlet Specification requires
that, when an error occurs and an error page is configured for the
error that occurred, the original request and response are forwarded
to the error page. This means that the request is presented to the
error page with the original HTTP method. If the error page is a
static file, expected behaviour is to serve content of the file as if
processing a GET request, regardless of the actual HTTP method. The
Default Servlet in Apache Tomcat did not do this. Depending on the
original request this could lead to unexpected and undesirable results
for static error pages including, if the DefaultServlet is configured
to permit writes, the replacement or removal of the custom error page.
For Debian 7 "Wheezy", these problems have been fixed in version
7.0.28-4+deb7u14.
We recommend that you upgrade your tomcat7 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | tomcat8-user | < 8.5.14-1+deb9u1 | tomcat8-user_8.5.14-1+deb9u1_all.deb |
Debian | 7 | all | libtomcat7-java | < 7.0.28-4+deb7u14 | libtomcat7-java_7.0.28-4+deb7u14_all.deb |
Debian | 8 | all | libtomcat8-java | < 8.0.14-1+deb8u10 | libtomcat8-java_8.0.14-1+deb8u10_all.deb |
Debian | 8 | all | libservlet3.0-java | < 7.0.56-3+deb8u11 | libservlet3.0-java_7.0.56-3+deb8u11_all.deb |
Debian | 8 | all | tomcat7-common | < 7.0.56-3+deb8u11 | tomcat7-common_7.0.56-3+deb8u11_all.deb |
Debian | 7 | all | tomcat7 | < 7.0.28-4+deb7u14 | tomcat7_7.0.28-4+deb7u14_all.deb |
Debian | 7 | all | tomcat7-common | < 7.0.28-4+deb7u14 | tomcat7-common_7.0.28-4+deb7u14_all.deb |
Debian | 9 | all | tomcat8 | < 8.5.14-1+deb9u1 | tomcat8_8.5.14-1+deb9u1_all.deb |
Debian | 7 | all | libservlet3.0-java-doc | < 7.0.28-4+deb7u14 | libservlet3.0-java-doc_7.0.28-4+deb7u14_all.deb |
Debian | 8 | all | libservlet3.1-java | < 8.0.14-1+deb8u10 | libservlet3.1-java_8.0.14-1+deb8u10_all.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
82.7%