Lucene search

K
ibmIBM86857E58370683CD6F1A7EFD8594D930D4071245BF08AD93E4E74F3BD64C8921
HistoryJun 17, 2018 - 4:55 a.m.

Security Bulletin: Rational Lifecycle Adapter for HP ALM Apache Tomcat fix (CVE-2013-4286, CVE-2014-0033, CVE-2013-4322, CVE-2013-4590, CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119)

2018-06-1704:55:05
www.ibm.com
6

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

Summary

A vulnerability has been identified in Rational Lifecycle Adapter for HP ALM V1.0 and V1.1. If you are using Apache Tomcat 7.x to run your HP ALM adapter, download and install the Apache Tomcat fix available on Fix Central.

Vulnerability Details

| Subscribe to My Notifications to be notified of important product support alerts like this.

  • Follow this link for more information (requires login with your IBM ID)
    —|—

CVE ID: CVE-2013-4286

Description: Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request’s length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a “Transfer-Encoding: chunked” header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.

CVSS Base Score: 4.3 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/91426&gt; for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE ID: CVE-2014-0033

Description: org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 through 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote attackers to conduct session fixation attacks via a crafted URL.

CVSS Base Score: 4.3 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/91423&gt; for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE ID: CVE-2013-4322

Description: Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.

CVSS Base Score: 5 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/91625&gt; for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVE ID: CVE-2013-4590

Description: Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain “Tomcat internals” information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

CVSS Base Score: 4.3 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/91424&gt; for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE-ID:CVE-2014-0075

**Description:**Apache Tomcat is vulnerable to a denial of service, caused by the improper handling of a malformed chunk size as part of a chucked request. A remote attacker could exploit this vulnerability to cause a denial of service.

**CVSS Base Score:**5
**CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93365&gt; for more information
*CVSS Environmental Score:**Undefined
CVSS Vector:(AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE-ID:CVE-2014-0095

**Description:**Apache Tomcat is vulnerable to a denial of service, caused by the improper handling of an AJP request. A remote attacker could exploit this vulnerability to consume a request processing thread and cause a denial of service.

CVSS Base Score: 4.3 **CVSS Temporal Score: **See<https://exchange.xforce.ibmcloud.com/vulnerabilities/93366&gt; for more information *CVSS Environmental Score: **Undefined **CVSS Vector: **(AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVE-ID:CVE-2014-0096

**Description:**Apache Tomcat could allow a remote attacker to obtain sensitive information, caused by an XML External Entity Injection (XXE) error when processing XML data by the default server. By sending specially-crafted XML data, an attacker could exploit this vulnerability to obtain sensitive information.

**CVSS Base Score:**4.3
**CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93367&gt; for more information
*CVSS Environmental Score:**Undefined
CVSS Vector:(AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVE-ID:CVE-2014-0099

**Description:**Apache Tomcat could allow a remote attacker to obtain sensitive information, caused by the failure to check for overflows when parsing content length headers. By sending specially-crafted request, an attacker could exploit this vulnerability to obtain sensitive information.

**CVSS Base Score:**5
**CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93369&gt; for more information
*CVSS Environmental Score:**Undefined
CVSS Vector:(AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE-ID:CVE-2014-0119

**Description:**Apache Tomcat could allow a remote attacker to obtain sensitive information, caused by the replacement of the XML parsers used to process XSLTs for the default servlet. An attacker could exploit this vulnerability using a specially-crafted application to obtain sensitive information.

**CVSS Base Score:**5
**CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/93368&gt; for more information
*CVSS Environmental Score:**Undefined
CVSS Vector:(AV:N/AC:L/Au:N/C:P/I:N/A:N)

Affected Products and Versions

Affected releases are:

  • Rational Lifecycle Adapter for HP ALM 1.0 through 1.1

Note: If you are using WebSphere Application Server, you are not affected by this problem.

Remediation/Fixes

If you are using Apache Tomcat 7.x to run your HP ALM adapter, download and install the fix Rational_RLIA_Standard_HP_Adapter_Tomcat_Fix_PSIRT_1545_1823 available on Fix Central.

The fix contains Apache Tomcat 7.0.54, which resolves the listed vulnerability.

Follow the instructions in the attached Readme.pdf file to install the fix.

Readme.pdfReadme.pdf

Workarounds and Mitigations

None

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N