what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 2897-1

Debian Security Advisory 2897-1
Posted Apr 8, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2897-1 - Multiple security issues were found in the Tomcat servlet and JSP engine.

tags | advisory
systems | linux, debian
advisories | CVE-2013-2067, CVE-2013-2071, CVE-2013-4286, CVE-2013-4322, CVE-2014-0050
SHA-256 | 2b66a4a8295291756dace91cbeeb0f72ed10e5069d62d5a8388c8a95212581eb

Debian Security Advisory 2897-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2897-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
April 08, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : tomcat7
CVE ID : CVE-2013-2067 CVE-2013-2071 CVE-2013-4286 CVE-2013-4322
CVE-2014-0050

Multiple security issues were found in the Tomcat servlet and JSP engine:

CVE-2013-2067

FORM authentication associates the most recent request requiring
authentication with the current session. By repeatedly sending a request
for an authenticated resource while the victim is completing the login
form, an attacker could inject a request that would be executed using the
victim's credentials.

CVE-2013-2071

A runtime exception in AsyncListener.onComplete() prevents the request from
being recycled. This may expose elements of a previous request to a current
request.

CVE-2013-4286

Reject requests with multiple content-length headers or with a content-length
header when chunked encoding is being used.

CVE-2013-4322

When processing a request submitted using the chunked transfer encoding,
Tomcat ignored but did not limit any extensions that were included. This allows
a client to perform a limited denial of service. by streaming an unlimited amount
of data to the server.

CVE-2014-0050

Multipart requests with a malformed Content-Type header could trigger an
infinite loop causing a denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 7.0.28-4+deb7u1.

For the testing distribution (jessie), these problems have been fixed in
version 7.0.52-1.

For the unstable distribution (sid), these problems have been fixed in
version 7.0.52-1.

We recommend that you upgrade your tomcat7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=uwle
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close