Lucene search

K
debianDebianDEBIAN:DSA-3530-1:6A530
HistoryMar 25, 2016 - 6:47 p.m.

[SECURITY] [DSA 3530-1] tomcat6 security update

2016-03-2518:47:56
lists.debian.org
45

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.004 Low

EPSS

Percentile

72.7%


Debian Security Advisory DSA-3530-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
March 25, 2016 https://www.debian.org/security/faq


Package : tomcat6
CVE ID : CVE-2013-4286 CVE-2013-4322 CVE-2013-4590 CVE-2014-0033
CVE-2014-0075 CVE-2014-0096 CVE-2014-0099 CVE-2014-0119
CVE-2014-0227 CVE-2014-0230 CVE-2014-7810 CVE-2015-5174
CVE-2015-5345 CVE-2015-5346 CVE-2015-5351 CVE-2016-0706
CVE-2016-0714 CVE-2016-0763

Multiple security vulnerabilities have been fixed in the Tomcat servlet
and JSP engine, which may result on bypass of security manager
restrictions, information disclosure, denial of service or session
fixation.

For the oldstable distribution (wheezy), these problems have been fixed
in version 6.0.45+dfsg-1~deb7u1.

We recommend that you upgrade your tomcat6 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.004 Low

EPSS

Percentile

72.7%