Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 329937 - <www-servers/tomcat-{5.5.32,6.0.32-r1,7.0.8}: Multiple Vulnerabilities (CVE-2010-{1157,2227,4172},CVE-2011-{0013,0534})
Summary: <www-servers/tomcat-{5.5.32,6.0.32-r1,7.0.8}: Multiple Vulnerabilities (CVE-2...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://svn.apache.org/viewvc?view=rev...
Whiteboard: B3 [glsa]
Keywords:
: 354081 (view as bug list)
Depends on: 354447
Blocks: CVE-2009-0033 CVE-2008-5515 322979
  Show dependency tree
 
Reported: 2010-07-26 15:34 UTC by Stefan Behte (RETIRED)
Modified: 2012-06-24 14:12 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Behte (RETIRED) gentoo-dev Security 2010-07-26 15:34:05 UTC
CVE-2010-2227 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2227):
  Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0
  beta does not properly handle an invalid Transfer-Encoding header,
  which allows remote attackers to cause a denial of service
  (application outage) or obtain sensitive information via a crafted
  header that interferes with "recycling of a buffer."
Comment 1 Tim Sammut (RETIRED) gentoo-dev 2010-11-23 06:08:43 UTC
6.0.28 also fixes this issue:

Low: Information disclosure in authentication headers CVE-2010-1157

The WWW-Authenticate HTTP header for BASIC and DIGEST authentication includes a realm name. If a <realm-name> element is specified for the application in web.xml it will be used. However, a <realm-name> is not specified then Tomcat will generate realm name using the code snippet request.getServerName() + ":" + request.getServerPort(). In some circumstances this can expose the local host name or IP address of the machine running Tomcat.This was fixed in revision 936540.


6.0.30 will fix this issue:

moderate: Cross-site scripting CVE-2010-4172

The Manager application used the user provided parameters sort and orderBy directly without filtering thereby permitting cross-site scripting. This was fixed in revision 1037779.

http://tomcat.apache.org/security-6.html
Comment 2 Tim Sammut (RETIRED) gentoo-dev 2011-01-14 08:03:55 UTC
(In reply to comment #1)
> 
> 6.0.30 will fix this issue:
> 

6.0.30 has been released.

http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.30
Comment 3 Stefan Behte (RETIRED) gentoo-dev Security 2011-01-21 11:16:15 UTC
CVE-2010-4172 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4172):
  Multiple cross-site scripting (XSS) vulnerabilities in the Manager
  application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through
  7.0.4 allow remote attackers to inject arbitrary web script or HTML
  via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or
  unspecified input to (3) sessionDetail.jsp or (4)
  java/org/apache/catalina/manager/JspHelper.java, related to use of
  untrusted web applications.

Comment 4 Tim Sammut (RETIRED) gentoo-dev 2011-02-05 03:08:12 UTC
Tomcat 6.0.32 has been released now that fixes another remote DoS vulnerability.

http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.32
Comment 5 Stefan Behte (RETIRED) gentoo-dev Security 2011-02-09 00:31:02 UTC
*** Bug 354081 has been marked as a duplicate of this bug. ***
Comment 6 Stefan Behte (RETIRED) gentoo-dev Security 2011-02-09 00:38:34 UTC
*** Bug 320963 has been marked as a duplicate of this bug. ***
Comment 7 Paul B. Henson 2011-02-09 18:44:04 UTC
tomcat 5.5.32 is the most recent version in the 5.5 train, any chance of getting an ebuild for that? I understand there's not too much interest in the 5.5 branch, but it's still considered production upstream and there are still webapps which don't work with 6 or 7 :(...

Thanks...
Comment 8 Miroslav Šulc gentoo-dev 2011-02-10 13:51:44 UTC
i bumped tomcat to 6.0.32 and 7.0.8. 5.5.32 fails to apply quite huge patch so it needs more time to bump that one which i do not have atm.
Comment 9 Tim Sammut (RETIRED) gentoo-dev 2011-02-10 13:57:24 UTC
(In reply to comment #8)
> i bumped tomcat to 6.0.32 and 7.0.8. 5.5.32 fails to apply quite huge patch so
> it needs more time to bump that one which i do not have atm.
> 

Great, thank you.

Should we stabilize 6.0.32 now? Or would you prefer to wait until 5.5.32 is ready as well? Thanks again.
Comment 10 Miroslav Šulc gentoo-dev 2011-02-10 14:04:23 UTC
well, i would not wait for 5.5.32 for sure as it might take quite long till someone else or me package it.

wrt 6.0.32, there was a change in jdt stuff. in 6.0.29, there was extra build target for building jdt support but it's not in 6.0.32 anymore:

"Switch to using the Eclipse compiler JAR directly rather than creating it from the larger JDT download. (markt)"

so in other words, there is a risk this change might break something. i guess this is related to compilation of jsp but i am not really sure. it would be best if someone with more experience could test it before it goes stable.
Comment 11 Paul B. Henson 2011-02-10 23:54:28 UTC
Thanks for looking at 5.5.32; I tried to port the patch to 5.5.31 (as attached to bug #272566), but while I got the patch to apply, tomcat then failed to build :(, which left me at a bit of a loss. I don't know if my initial attempt at the patch would be more of a help or hindrance ;), but you could find it on bug #272566.

Thanks again...
Comment 12 Miroslav Šulc gentoo-dev 2011-02-12 17:00:20 UTC
as written in bug #354447, i just committed tomcat-6.0.32-r1. as the reporter wrote, this one fixes the JSP compilation issue. i also used that version for one night while coding and it was working fine so imo it's safe to stabilize it.

as for 5.5.32, i will try to ask wltjr who used to be tomcat maintainer if he could have a look at it. he might fix it pretty fast in case he still remembers the reasons for the patch.
Comment 13 Tim Sammut (RETIRED) gentoo-dev 2011-02-12 18:37:24 UTC
Thanks, folks. If I understand correctly, we're good to stabilize =www-servers/tomcat-6.0.32-r1. So...

Arches, please test and mark stable:
=www-servers/tomcat-6.0.32-r1
Target keywords : "amd64 ppc ppc64 x86"
Comment 14 Kacper Kowalik (Xarthisius) (RETIRED) gentoo-dev 2011-02-12 19:55:23 UTC
ppc/ppc64 stable
Comment 15 Christian Faulhammer (RETIRED) gentoo-dev 2011-02-13 00:55:01 UTC
x86 stable
Comment 16 Markos Chandras (RETIRED) gentoo-dev 2011-02-13 11:31:54 UTC
amd64 done
Comment 17 Tim Sammut (RETIRED) gentoo-dev 2011-02-13 15:24:30 UTC
Thanks, everyone. From a security perspective, this bug is nearly complete except for possible publication of a GLSA. I have opened bug 354741 to track the stabilization of tomcat 5.5.32.

GLSA Vote: Yes.
Comment 18 Tobias Heinlein (RETIRED) gentoo-dev 2011-10-08 22:40:07 UTC
GLSA vote: YES, request filed.
Comment 19 Miroslav Šulc gentoo-dev 2011-12-24 20:33:07 UTC
tomcat 5.5.x has been removed from the main tree because it's heading its eol in 2012-09-30 and it's unmaintained on our side (all the effort goes to 6.x and 7.x releases). tomcat 5.5.x has been moved to java-overlay for those that still need it.
Comment 20 Miroslav Šulc gentoo-dev 2012-03-25 20:22:54 UTC
no affected version in the tree anymore
Comment 21 GLSAMaker/CVETool Bot gentoo-dev 2012-06-24 14:12:29 UTC
This issue was resolved and addressed in
 GLSA 201206-24 at http://security.gentoo.org/glsa/glsa-201206-24.xml
by GLSA coordinator Tobias Heinlein (keytoaster).