Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.2.2016.1049
Kategorie:Huawei EulerOS Local Security Checks
Titel:Huawei EulerOS: Security Advisory for tomcat (EulerOS-SA-2016-1049)
Zusammenfassung:The remote host is missing an update for the Huawei EulerOS 'tomcat' package(s) announced via the EulerOS-SA-2016-1049 advisory.
Beschreibung:Summary:
The remote host is missing an update for the Huawei EulerOS 'tomcat' package(s) announced via the EulerOS-SA-2016-1049 advisory.

Vulnerability Insight:
The Expression Language (EL) implementation in Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.58, and 8.x before 8.0.16 does not properly consider the possibility of an accessible interface implemented by an inaccessible class, which allows attackers to bypass a SecurityManager protection mechanism via a web application that leverages use of incorrect privileges during EL evaluation.(CVE-2014-7810)

Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.(CVE-2015-5346)

Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an 'httpoxy' issue. NOTE: the vendor states 'A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388', in other words, this is not a CVE ID for a vulnerability.(CVE-2016-5388)

It was discovered that the Tomcat packages installed configuration file /usr/lib/tmpfiles.d/tomcat.conf writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges.(CVE-2016-5425)

It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges.(CVE-2016-6325)

Affected Software/OS:
'tomcat' package(s) on Huawei EulerOS V2.0SP1.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-7810
BugTraq ID: 74665
http://www.securityfocus.com/bid/74665
Debian Security Information: DSA-3428 (Google Search)
http://www.debian.org/security/2015/dsa-3428
Debian Security Information: DSA-3447 (Google Search)
http://www.debian.org/security/2016/dsa-3447
Debian Security Information: DSA-3530 (Google Search)
http://www.debian.org/security/2016/dsa-3530
HPdes Security Advisory: HPSBUX03561
http://marc.info/?l=bugtraq&m=145974991225029&w=2
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
RedHat Security Advisories: RHSA-2015:1621
http://rhn.redhat.com/errata/RHSA-2015-1621.html
RedHat Security Advisories: RHSA-2015:1622
http://rhn.redhat.com/errata/RHSA-2015-1622.html
RedHat Security Advisories: RHSA-2016:0492
http://rhn.redhat.com/errata/RHSA-2016-0492.html
RedHat Security Advisories: RHSA-2016:2046
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.securitytracker.com/id/1032330
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-5346
BugTraq ID: 83323
http://www.securityfocus.com/bid/83323
Bugtraq: 20160222 [SECURITY] CVE-2015-5346 Apache Tomcat Session fixation (Google Search)
http://seclists.org/bugtraq/2016/Feb/143
Debian Security Information: DSA-3552 (Google Search)
http://www.debian.org/security/2016/dsa-3552
Debian Security Information: DSA-3609 (Google Search)
http://www.debian.org/security/2016/dsa-3609
https://security.gentoo.org/glsa/201705-09
http://packetstormsecurity.com/files/135890/Apache-Tomcat-Session-Fixation.html
RedHat Security Advisories: RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1087
RedHat Security Advisories: RHSA-2016:1088
https://access.redhat.com/errata/RHSA-2016:1088
RedHat Security Advisories: RHSA-2016:1089
http://rhn.redhat.com/errata/RHSA-2016-1089.html
RedHat Security Advisories: RHSA-2016:2807
http://rhn.redhat.com/errata/RHSA-2016-2807.html
RedHat Security Advisories: RHSA-2016:2808
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://www.securitytracker.com/id/1035069
SuSE Security Announcement: SUSE-SU-2016:0769 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
SuSE Security Announcement: SUSE-SU-2016:0822 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
SuSE Security Announcement: openSUSE-SU-2016:0865 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://www.ubuntu.com/usn/USN-3024-1
Common Vulnerability Exposure (CVE) ID: CVE-2016-5388
BugTraq ID: 91818
http://www.securityfocus.com/bid/91818
CERT/CC vulnerability note: VU#797896
http://www.kb.cert.org/vuls/id/797896
https://httpoxy.org/
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d@%3Cissues.activemq.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39@%3Cusers.tomcat.apache.org%3E
RedHat Security Advisories: RHSA-2016:1624
http://rhn.redhat.com/errata/RHSA-2016-1624.html
RedHat Security Advisories: RHSA-2016:1635
https://access.redhat.com/errata/RHSA-2016:1635
RedHat Security Advisories: RHSA-2016:1636
https://access.redhat.com/errata/RHSA-2016:1636
RedHat Security Advisories: RHSA-2016:2045
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://www.securitytracker.com/id/1036331
SuSE Security Announcement: openSUSE-SU-2016:2252 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-5425
BugTraq ID: 93472
http://www.securityfocus.com/bid/93472
https://www.exploit-db.com/exploits/40488/
http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
http://packetstormsecurity.com/files/139041/Apache-Tomcat-8-7-6-Privilege-Escalation.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
http://www.openwall.com/lists/oss-security/2016/10/10/2
http://www.securitytracker.com/id/1036979
Common Vulnerability Exposure (CVE) ID: CVE-2016-6325
BugTraq ID: 93478
http://www.securityfocus.com/bid/93478
RedHat Security Advisories: RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0455
RedHat Security Advisories: RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:0456
RedHat Security Advisories: RHSA-2017:0457
http://rhn.redhat.com/errata/RHSA-2017-0457.html
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.