Summary: | <www-servers/tomcat-{6.0.41,7.0.56}: Multiple Vulnerabilities (CVE-2014-{0075,0096,0099,0119}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | java |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://tomcat.apache.org/security-7.html | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 519590 | ||
Bug Blocks: |
Description
Agostino Sarubbo
![]() Adding some more vulnerabilities and CVE's. Fixed in following versions as per URL upstream: http://tomcat.apache.org/security-7.html Fixed in Apache Tomcat 7.0.53 CVE-2014-0075, CVE-2014-0096, CVE-2014-0099 Fixed in Apache Tomcat 7.0.54 CVE-2014-0119 Maintainer(s): after the bump please let us know when the ebuild is ready for stabilization. CVE-2014-0119 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0119): Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application. CVE-2014-0099 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0099): Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header. CVE-2014-0096 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0096): java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. CVE-2014-0075 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0075): Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data. Just committed tomcat-6.0.41 and tomcat-7.0.56. This issue was resolved and addressed in GLSA 201412-29 at http://security.gentoo.org/glsa/glsa-201412-29.xml by GLSA coordinator Sean Amoss (ackle). |