CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
99.3%
Debian Security Advisory DSA-3530-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
March 25, 2016 https://www.debian.org/security/faq
Package : tomcat6
CVE ID : CVE-2013-4286 CVE-2013-4322 CVE-2013-4590 CVE-2014-0033
CVE-2014-0075 CVE-2014-0096 CVE-2014-0099 CVE-2014-0119
CVE-2014-0227 CVE-2014-0230 CVE-2014-7810 CVE-2015-5174
CVE-2015-5345 CVE-2015-5346 CVE-2015-5351 CVE-2016-0706
CVE-2016-0714 CVE-2016-0763
Multiple security vulnerabilities have been fixed in the Tomcat servlet
and JSP engine, which may result on bypass of security manager
restrictions, information disclosure, denial of service or session
fixation.
For the oldstable distribution (wheezy), these problems have been fixed
in version 6.0.45+dfsg-1~deb7u1.
We recommend that you upgrade your tomcat6 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | all | tomcat6-user | < 6.0.45+dfsg-1~deb7u1 | tomcat6-user_6.0.45+dfsg-1~deb7u1_all.deb |
Debian | 6 | all | tomcat6-docs | < 6.0.45-1~deb6u1 | tomcat6-docs_6.0.45-1~deb6u1_all.deb |
Debian | 8 | all | tomcat7-common | < 7.0.56-3+deb8u2 | tomcat7-common_7.0.56-3+deb8u2_all.deb |
Debian | 7 | all | libtomcat7-java | < 7.0.28-4+deb7u4 | libtomcat7-java_7.0.28-4+deb7u4_all.deb |
Debian | 8 | all | tomcat7-user | < 7.0.56-3+deb8u2 | tomcat7-user_7.0.56-3+deb8u2_all.deb |
Debian | 7 | all | libtomcat6-java | < 6.0.45+dfsg-1~deb7u1 | libtomcat6-java_6.0.45+dfsg-1~deb7u1_all.deb |
Debian | 6 | all | tomcat6-common | < 6.0.41-2+squeeze7 | tomcat6-common_6.0.41-2+squeeze7_all.deb |
Debian | 7 | all | libservlet3.0-java | < 7.0.28-4+deb7u4 | libservlet3.0-java_7.0.28-4+deb7u4_all.deb |
Debian | 7 | all | libservlet3.0-java | < 7.0.28-4+deb7u3 | libservlet3.0-java_7.0.28-4+deb7u3_all.deb |
Debian | 8 | all | tomcat8-docs | < 8.0.14-1+deb8u1 | tomcat8-docs_8.0.14-1+deb8u1_all.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
99.3%