Lucene search

K
ubuntuUbuntuUSN-4448-1
HistoryAug 04, 2020 - 12:00 a.m.

Tomcat vulnerabilities

2020-08-0400:00:00
ubuntu.com
47

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.1 High

AI Score

Confidence

Low

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.922 High

EPSS

Percentile

98.9%

Releases

  • Ubuntu 16.04 ESM

Packages

  • tomcat8 - Servlet and JSP engine

Details

It was discovered that Tomcat incorrectly validated the payload length in
a WebSocket frame. A remote attacker could possibly use this issue to cause
Tomcat to hang, resulting in a denial of service. (CVE-2020-13935)

It was discovered that Tomcat incorrectly handled HTTP header parsing. In
certain environments where Tomcat is located behind a reverse proxy, a
remote attacker could possibly use this issue to perform HTTP Reqest
Smuggling. (CVE-2020-1935)

It was discovered that Tomcat incorrectly handled certain uncommon
PersistenceManager with FileStore configurations. A remote attacker could
possibly use this issue to execute arbitrary code. (CVE-2020-9484)

OSVersionArchitecturePackageVersionFilename
Ubuntu16.04noarchlibtomcat8-java< 8.0.32-1ubuntu1.13UNKNOWN
Ubuntu16.04noarchlibservlet3.1-java< 8.0.32-1ubuntu1.13UNKNOWN
Ubuntu16.04noarchlibservlet3.1-java-doc< 8.0.32-1ubuntu1.13UNKNOWN
Ubuntu16.04noarchtomcat8< 8.0.32-1ubuntu1.13UNKNOWN
Ubuntu16.04noarchtomcat8-admin< 8.0.32-1ubuntu1.13UNKNOWN
Ubuntu16.04noarchtomcat8-common< 8.0.32-1ubuntu1.13UNKNOWN
Ubuntu16.04noarchtomcat8-docs< 8.0.32-1ubuntu1.13UNKNOWN
Ubuntu16.04noarchtomcat8-examples< 8.0.32-1ubuntu1.13UNKNOWN
Ubuntu16.04noarchtomcat8-user< 8.0.32-1ubuntu1.13UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.1 High

AI Score

Confidence

Low

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.922 High

EPSS

Percentile

98.9%