SUSE-SU-2016:0839-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2016:0839-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2016:0839-1
Related
Published
2016-03-21T09:27:05Z
Modified
2016-03-21T09:27:05Z
Summary
Security update for tomcat6
Details

This update for tomcat6 fixes the following issues:

The version was updated from 6.0.41 to 6.0.45.

Security issues fixed:

  • CVE-2015-5174: Directory traversal vulnerability in RequestUtil.java in Apache Tomcat allowed remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory. (bsc#967967)
  • CVE-2015-5345: The Mapper component in Apache Tomcat processes redirects before considering security constraints and Filters, which allowed remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character. (bsc#967965)
  • CVE-2016-0706: Apache Tomcat did not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allowed remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application. (bsc#967815)
  • CVE-2016-0714: The session-persistence implementation in Apache Tomcat mishandled session attributes, which allowed remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session. (bsc#967964)
References

Affected packages

SUSE:Linux Enterprise Server 11 SP4 / tomcat6

Package

Name
tomcat6
Purl
purl:rpm/suse/tomcat6&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.45-0.50.1

Ecosystem specific

{
    "binaries": [
        {
            "tomcat6-docs-webapp": "6.0.45-0.50.1",
            "tomcat6-webapps": "6.0.45-0.50.1",
            "tomcat6-servlet-2_5-api": "6.0.45-0.50.1",
            "tomcat6-jsp-2_1-api": "6.0.45-0.50.1",
            "tomcat6-javadoc": "6.0.45-0.50.1",
            "tomcat6": "6.0.45-0.50.1",
            "tomcat6-admin-webapps": "6.0.45-0.50.1",
            "tomcat6-lib": "6.0.45-0.50.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / tomcat6

Package

Name
tomcat6
Purl
purl:rpm/suse/tomcat6&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.45-0.50.1

Ecosystem specific

{
    "binaries": [
        {
            "tomcat6-docs-webapp": "6.0.45-0.50.1",
            "tomcat6-webapps": "6.0.45-0.50.1",
            "tomcat6-servlet-2_5-api": "6.0.45-0.50.1",
            "tomcat6-jsp-2_1-api": "6.0.45-0.50.1",
            "tomcat6-javadoc": "6.0.45-0.50.1",
            "tomcat6": "6.0.45-0.50.1",
            "tomcat6-admin-webapps": "6.0.45-0.50.1",
            "tomcat6-lib": "6.0.45-0.50.1"
        }
    ]
}