http://tomcat.apache.org/tomcat-6.0-doc/changelog.html Security issu...">Security update for tomcat6 (important) - vulnerability database | Vulners.comhttp://tomcat.apache.org/tomcat-6.0-doc/changelog.html Security issu...">http://tomcat.apache.org/tomcat-6.0-doc/changelog.html Security issu...">http://tomcat.apache.org/tomcat-6.0-doc/changelog.html Security issu...">
Lucene search

K
suse
SuseSUSE-SU-2017:1632-1
HistoryJun 21, 2017 - 12:10 p.m.

Security update for tomcat6 (important)

2017-06-2112:10:05
lists.opensuse.org
41

0.948 High

EPSS

Percentile

99.1%

This update for tomcat6 fixes the following issues:

Tomcat was updated to version 6.0.53:

The full changelog is:
<a href=“http://tomcat.apache.org/tomcat-6.0-doc/changelog.html”>http://tomcat.apache.org/tomcat-6.0-doc/changelog.html</a>

Security issues fixed:

  • CVE-2017-5647: A bug in the handling of pipelined requests could lead to
    information disclosure (bsc#1036642)
  • CVE-2016-8745: Regression in the error handling methods could lead to
    information disclosure (bsc#1015119)
  • CVE-2016-8735: Remote code execution vulnerability in
    JmxRemoteLifecycleListener (bsc#1011805)
  • CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting
    invalid character in HTTP requests (bsc#1011812)
  • CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)
  • CVE-2016-6796: Manager Bypass (bsc#1007858)
  • CVE-2016-6794: System Property Disclosure (bsc#1007857)
  • CVE-2016-5018: Security Manager Bypass (bsc#1007855)
  • CVE-2016-0762: Realm Timing Attack (bsc#1007854)
  • CVE-2016-5388: an arbitrary HTTP_PROXY environment variable might allow
    remote attackers to redirect outbound HTTP traffic (bsc#988489)
How to protect your server from attacks?

0.948 High

EPSS

Percentile

99.1%

Related for SUSE-SU-2017:1632-1