Lucene search

K
redhatRedHatRHSA-2013:0872
HistoryMay 28, 2013 - 12:00 a.m.

(RHSA-2013:0872) Important: tomcat5 and tomcat6 security update

2013-05-2800:00:00
access.redhat.com
24

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.7%

Apache Tomcat is a servlet container for the Java Servlet and JavaServer
Pages (JSP) technologies.

A flaw was found in the way the tomcat5 and tomcat6 init scripts handled
the tomcat5-initd.log and tomcat6-initd.log log files. A malicious web
application deployed on Tomcat could use this flaw to perform a symbolic
link attack to change the ownership of an arbitrary system file to that of
the tomcat user, allowing them to escalate their privileges to root.
(CVE-2013-1976)

Note: With this update, tomcat5-initd.log and tomcat6-initd.log have been
moved to the /var/log/ directory.

Red Hat would like to thank Simon Fayer of Imperial College London for
reporting this issue.

Warning: Before applying the update, back up your existing JBoss Enterprise
Web Server installation (including all applications and configuration
files).

Users of Tomcat should upgrade to these updated packages, which resolve
this issue. Tomcat must be restarted for this update to take effect.

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.7%