https://tomcat.apache.org/tomcat-7.0-doc/changelog.html Security issues fixed: CV...">Security update for tomcat (important) - vulnerability database | Vulners.comhttps://tomcat.apache.org/tomcat-7.0-doc/changelog.html Security issues fixed: CV...">https://tomcat.apache.org/tomcat-7.0-doc/changelog.html Security issues fixed: CV...">https://tomcat.apache.org/tomcat-7.0-doc/changelog.html Security issues fixed: CV...">
Lucene search

K
suse
SuseSUSE-SU-2017:1660-1
HistoryJun 23, 2017 - 3:09 p.m.

Security update for tomcat (important)

2017-06-2315:09:55
lists.opensuse.org
44

0.948 High

EPSS

Percentile

99.1%

Tomcat was updated to version 7.0.78, fixing various bugs and security
issues.

For full details see
<a href=“https://tomcat.apache.org/tomcat-7.0-doc/changelog.html”>https://tomcat.apache.org/tomcat-7.0-doc/changelog.html</a>

Security issues fixed:

  • CVE-2016-0762: A realm timing attack in tomcat was fixed which could
    disclose existence of users (bsc#1007854)
  • CVE-2016-3092: Usage of vulnerable FileUpload package could have
    resulted in denial of service (bsc#986359)
  • CVE-2016-5018: A security manager bypass via a Tomcat utility method
    that was accessible to web applications was fixed. (bsc#1007855)
  • CVE-2016-5388: Setting HTTP_PROXY environment variable via Proxy header
    (bsc#988489)
  • CVE-2016-6794: A tomcat system property disclosure was fixed.
    (bsc#1007857)
  • CVE-2016-6796: A tomcat security manager bypass via manipulation of the
    configuration parameters for the JSP Servlet. (bsc#1007858)
  • CVE-2016-6797: A tomcat unrestricted access to global resources via
    ResourceLinkFactory was fixed. (bsc#1007853)
  • CVE-2016-6816: A HTTP Request smuggling vulnerability due to permitting
    invalid character in HTTP requests was fixed. (bsc#1011812)
  • CVE-2016-8735: A Remote code execution vulnerability in
    JmxRemoteLifecycleListener was fixed (bsc#1011805)
  • CVE-2016-8745: A Tomcat Information Disclosure in the error handling of
    send file code for the NIO HTTP connector was fixed. (bsc#1015119)
  • CVE-2017-5647: A tomcat information disclosure in pipelined request
    processing was fixed. (bsc#1033448)
  • CVE-2017-5648: A tomcat information disclosure due to using incorrect
    facade objects was fixed (bsc#1033447)
How to protect your server from attacks?

0.948 High

EPSS

Percentile

99.1%

Related for SUSE-SU-2017:1660-1