Debian Security Advisory DSA-1447-1 email@example.com http://www.debian.org/security/ Moritz Muehlenhoff January 03, 2008 http://www.debian.org/security/faq
Package : tomcat5.5 Vulnerability : several Problem type : remote Debian-specific: no CVE Id(s) : CVE-2007-3382 CVE-2007-3385 CVE-2007-3386 CVE-2007-5342 CVE-2007-5461
Several remote vulnerabilities have been discovered in the Tomcat servlet and JSP engine. The Common Vulnerabilities and Exposures project identifies the following problems:
It was discovered that single quotes (') in cookies were treated as a delimiter, which could lead to an information leak.
It was discovered that the character sequence \" in cookies was handled incorrectly, which could lead to an information leak.
It was discovered that the host manager servlet performed insufficient input validation, which could lead to cross-site scripting.
It was discovered that the JULI logging component did not restrict its target path, resulting in potential denial of service through file overwrites.
It was discovered that the WebDAV servlet is vulnerable to absolute path traversal.
For the stable distribution (etch), these problems have been fixed in version 5.5.20-2etch1.
The old stable distribution (sarge) doesn't contain tomcat5.5.
The unstable distribution (sid) will be fixed soon.
We recommend that you upgrade your tomcat5.5 packages.
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian 4.0 (stable)
Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
http://security.debian.org/pool/updates/main/t/tomcat5.5/tomcat5.5_5.5.20.orig.tar.gz Size/MD5 checksum: 4796377 5775bae8fac16a0e3a2c913c4768bb37 http://security.debian.org/pool/updates/main/t/tomcat5.5/tomcat5.5_5.5.20-2etch1.dsc Size/MD5 checksum: 1277 c2193e917dd759a50b8481177bfcef39 http://security.debian.org/pool/updates/main/t/tomcat5.5/tomcat5.5_5.5.20-2etch1.diff.gz Size/MD5 checksum: 28422 6df1691cbea55b10e2d2d865b4b2983a
Architecture independent packages:
http://security.debian.org/pool/updates/main/t/tomcat5.5/libtomcat5.5-java_5.5.20-2etch1_all.deb Size/MD5 checksum: 2385530 5f6482d73f7507b5f2f050ea825ee800 http://security.debian.org/pool/updates/main/t/tomcat5.5/tomcat5.5-webapps_5.5.20-2etch1_all.deb Size/MD5 checksum: 1472296 4bc554684655794b1d82db2160d67bea http://security.debian.org/pool/updates/main/t/tomcat5.5/tomcat5.5_5.5.20-2etch1_all.deb Size/MD5 checksum: 56744 a1de64bb115d03c4d33c28065e0c793a http://security.debian.org/pool/updates/main/t/tomcat5.5/tomcat5.5-admin_5.5.20-2etch1_all.deb Size/MD5 checksum: 1162332 ab90aab000037913260361eec812c573
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: firstname.lastname@example.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>