[SECURITY] [DSA 1447-1] New tomcat5.5 packages fix several vulnerabilities

2008-01-03T21:55:47
ID DEBIAN:DSA-1447-1:D5F9E
Type debian
Reporter Debian
Modified 2008-01-03T21:55:47

Description


Debian Security Advisory DSA-1447-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff January 03, 2008 http://www.debian.org/security/faq


Package : tomcat5.5 Vulnerability : several Problem type : remote Debian-specific: no CVE Id(s) : CVE-2007-3382 CVE-2007-3385 CVE-2007-3386 CVE-2007-5342 CVE-2007-5461

Several remote vulnerabilities have been discovered in the Tomcat servlet and JSP engine. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2007-3382

It was discovered that single quotes (') in cookies were treated
as a delimiter, which could lead to an information leak.

CVE-2007-3385

It was discovered that the character sequence \" in cookies was
handled incorrectly, which could lead to an information leak.

CVE-2007-3386

It was discovered that the host manager servlet performed
insufficient input validation, which could lead to cross-site
scripting.

CVE-2007-5342

It was discovered that the JULI logging component did not restrict
its target path, resulting in potential denial of service through
file overwrites.

CVE-2007-5461

It was discovered that the WebDAV servlet is vulnerable to absolute
path traversal.

For the stable distribution (etch), these problems have been fixed in version 5.5.20-2etch1.

The old stable distribution (sarge) doesn't contain tomcat5.5.

The unstable distribution (sid) will be fixed soon.

We recommend that you upgrade your tomcat5.5 packages.

Upgrade instructions


wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update will update the internal database apt-get upgrade will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian 4.0 (stable)


Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/t/tomcat5.5/tomcat5.5_5.5.20.orig.tar.gz Size/MD5 checksum: 4796377 5775bae8fac16a0e3a2c913c4768bb37 http://security.debian.org/pool/updates/main/t/tomcat5.5/tomcat5.5_5.5.20-2etch1.dsc Size/MD5 checksum: 1277 c2193e917dd759a50b8481177bfcef39 http://security.debian.org/pool/updates/main/t/tomcat5.5/tomcat5.5_5.5.20-2etch1.diff.gz Size/MD5 checksum: 28422 6df1691cbea55b10e2d2d865b4b2983a

Architecture independent packages:

http://security.debian.org/pool/updates/main/t/tomcat5.5/libtomcat5.5-java_5.5.20-2etch1_all.deb Size/MD5 checksum: 2385530 5f6482d73f7507b5f2f050ea825ee800 http://security.debian.org/pool/updates/main/t/tomcat5.5/tomcat5.5-webapps_5.5.20-2etch1_all.deb Size/MD5 checksum: 1472296 4bc554684655794b1d82db2160d67bea http://security.debian.org/pool/updates/main/t/tomcat5.5/tomcat5.5_5.5.20-2etch1_all.deb Size/MD5 checksum: 56744 a1de64bb115d03c4d33c28065e0c793a http://security.debian.org/pool/updates/main/t/tomcat5.5/tomcat5.5-admin_5.5.20-2etch1_all.deb Size/MD5 checksum: 1162332 ab90aab000037913260361eec812c573

These files will probably be moved into the stable distribution on its next update.


For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>