It was discovered that Tomcat incorrectly handled certain pipelined requests when sendfile was used. A remote attacker could use this issue to obtain wrong responses possibly containing sensitive information. (CVE-2017-5647)
It was discovered that Tomcat incorrectly used the appropriate facade object. A malicious application could possibly use this to bypass Security Manager restrictions. (CVE-2017-5648)
It was discovered that Tomcat incorrectly handled error pages. A remote attacker could possibly use this issue to replace or remove the custom error page. (CVE-2017-5664)
It was discovered that Tomcat incorrectly handled the CORS filter. A remote attacker could possibly use this issue to perform cache poisoning. (CVE-2017-7674)
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libservlet3.0-java",
"binary_version": "7.0.52-1ubuntu0.13"
},
{
"binary_name": "libtomcat7-java",
"binary_version": "7.0.52-1ubuntu0.13"
},
{
"binary_name": "tomcat7",
"binary_version": "7.0.52-1ubuntu0.13"
},
{
"binary_name": "tomcat7-admin",
"binary_version": "7.0.52-1ubuntu0.13"
},
{
"binary_name": "tomcat7-common",
"binary_version": "7.0.52-1ubuntu0.13"
},
{
"binary_name": "tomcat7-docs",
"binary_version": "7.0.52-1ubuntu0.13"
},
{
"binary_name": "tomcat7-examples",
"binary_version": "7.0.52-1ubuntu0.13"
},
{
"binary_name": "tomcat7-user",
"binary_version": "7.0.52-1ubuntu0.13"
}
]
}
{
"ecosystem": "Ubuntu:14.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2017-5647"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2017-5648"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2017-5664"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2017-7674"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libservlet3.1-java",
"binary_version": "8.0.32-1ubuntu1.5"
},
{
"binary_name": "libtomcat8-java",
"binary_version": "8.0.32-1ubuntu1.5"
},
{
"binary_name": "tomcat8",
"binary_version": "8.0.32-1ubuntu1.5"
},
{
"binary_name": "tomcat8-admin",
"binary_version": "8.0.32-1ubuntu1.5"
},
{
"binary_name": "tomcat8-common",
"binary_version": "8.0.32-1ubuntu1.5"
},
{
"binary_name": "tomcat8-docs",
"binary_version": "8.0.32-1ubuntu1.5"
},
{
"binary_name": "tomcat8-examples",
"binary_version": "8.0.32-1ubuntu1.5"
},
{
"binary_name": "tomcat8-user",
"binary_version": "8.0.32-1ubuntu1.5"
}
]
}
{
"ecosystem": "Ubuntu:16.04:LTS",
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2017-5647"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2017-5648"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2017-5664"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2017-7674"
}
]
}