it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 2897-1] tomcat7 security update
- Date: Tue, 8 Apr 2014 20:25:14 +0200
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
- Old-return-path: <jmm AT inutil.org>
- Priority: urgent
- Resent-date: Tue, 8 Apr 2014 18:25:42 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <lQpoyPTTuEL.A.8eD.m8DRTB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2897-1 security AT debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
April 08, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : tomcat7
CVE ID : CVE-2013-2067 CVE-2013-2071 CVE-2013-4286 CVE-2013-4322
CVE-2014-0050
Multiple security issues were found in the Tomcat servlet and JSP engine:
CVE-2013-2067
FORM authentication associates the most recent request requiring
authentication with the current session. By repeatedly sending a request
for an authenticated resource while the victim is completing the login
form, an attacker could inject a request that would be executed using the
victim's credentials.
CVE-2013-2071
A runtime exception in AsyncListener.onComplete() prevents the request
from
being recycled. This may expose elements of a previous request to a
current
request.
CVE-2013-4286
Reject requests with multiple content-length headers or with a
content-length
header when chunked encoding is being used.
CVE-2013-4322
When processing a request submitted using the chunked transfer encoding,
Tomcat ignored but did not limit any extensions that were included. This
allows
a client to perform a limited denial of service. by streaming an
unlimited amount
of data to the server.
CVE-2014-0050
Multipart requests with a malformed Content-Type header could trigger an
infinite loop causing a denial of service.
For the stable distribution (wheezy), these problems have been fixed in
version 7.0.28-4+deb7u1.
For the testing distribution (jessie), these problems have been fixed in
version 7.0.52-1.
For the unstable distribution (sid), these problems have been fixed in
version 7.0.52-1.
We recommend that you upgrade your tomcat7 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=uwle
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST AT lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster AT lists.debian.org
Archive: https://lists.debian.org/20140408182514.GA2630 AT pisco.westfalen.local
- [IT-SecNots] [SECURITY] [DSA 2897-1] tomcat7 security update, Moritz Muehlenhoff, 08.04.2014
Archiv bereitgestellt durch MHonArc 2.6.19.