CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
72.2%
Debian Security Advisory DSA-3842-1 [email protected]
https://www.debian.org/security/ Sebastien Delafond
May 03, 2017 https://www.debian.org/security/faq
Package : tomcat7
CVE ID : CVE-2017-5647 CVE-2017-5648
Two vulnerabilities were discovered in tomcat7, a servlet and JSP
engine.
CVE-2017-5647
Pipelined requests were processed incorrectly, which could result in
some responses appearing to be sent for the wrong request.
CVE-2017-5648
Some application listeners calls were issued against the wrong
objects, allowing untrusted applications running under a
SecurityManager to bypass that protection mechanism and access or
modify information associated with other web applications.
For the stable distribution (jessie), these problems have been fixed in
version 7.0.56-3+deb8u10.
For the upcoming stable (stretch) and unstable (sid) distributions,
these problems have been fixed in version 7.0.72-3.
We recommend that you upgrade your tomcat7 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | all | tomcat7-examples | < 7.0.56-3+deb8u10 | tomcat7-examples_7.0.56-3+deb8u10_all.deb |
Debian | 8 | all | tomcat8-examples | < 8.0.14-1+deb8u9 | tomcat8-examples_8.0.14-1+deb8u9_all.deb |
Debian | 7 | all | tomcat7-examples | < 7.0.28-4+deb7u12 | tomcat7-examples_7.0.28-4+deb7u12_all.deb |
Debian | 8 | all | tomcat7 | < 7.0.56-3+deb8u10 | tomcat7_7.0.56-3+deb8u10_all.deb |
Debian | 8 | all | libtomcat7-java | < 7.0.56-3+deb8u10 | libtomcat7-java_7.0.56-3+deb8u10_all.deb |
Debian | 7 | all | libservlet3.0-java | < 7.0.28-4+deb7u12 | libservlet3.0-java_7.0.28-4+deb7u12_all.deb |
Debian | 7 | all | tomcat7-user | < 7.0.28-4+deb7u12 | tomcat7-user_7.0.28-4+deb7u12_all.deb |
Debian | 8 | all | tomcat8 | < 8.0.14-1+deb8u9 | tomcat8_8.0.14-1+deb8u9_all.deb |
Debian | 8 | all | tomcat7-admin | < 7.0.56-3+deb8u10 | tomcat7-admin_7.0.56-3+deb8u10_all.deb |
Debian | 8 | all | libservlet3.0-java | < 7.0.56-3+deb8u10 | libservlet3.0-java_7.0.56-3+deb8u10_all.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
72.2%