[Forgot Password]
Login  Register Subscribe

24003

 
 

131486

 
 

106342

 
 

909

 
 

84662

 
 

134

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2017:3081-01 -- Redhat tomcat, tomcat-servlet-3.0-api

ID: oval:org.secpod.oval:def:502188Date: (C)2017-11-03   (M)2018-05-11
Class: PATCHFamily: unix




Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages technologies. Security Fix: * A vulnerability was discovered in Tomcat"s handling of pipelined requests when "Sendfile" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. * Two vulnerabilities were discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. * A vulnerability was discovered in Tomcat where the CORS Filter did not send a "Vary: Origin" HTTP header. This potentially allowed sensitive data to be leaked to other visitors through both client-side and server-side caches

Platform:
Red Hat Enterprise Linux 7
Product:
tomcat
tomcat-servlet
Reference:
RHSA-2017:3081-01
CVE-2017-12615
CVE-2017-12617
CVE-2017-5647
CVE-2017-7674
CVE    4
CVE-2017-12615
CVE-2017-5647
CVE-2017-12617
CVE-2017-7674
...
CPE    219
cpe:/a:apache:tomcat:7.0
cpe:/a:apache:tomcat:6.0.50
cpe:/a:apache:tomcat:6.0.52
cpe:/a:apache:tomcat:6.0.51
...

© 2013 SecPod Technologies