Ubuntu Security Notice (C) 2011-2016 Canonical, Inc. / NASL script (C) 2011-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
It was discovered that Tomcat incorrectly implemented HTTP DIGEST
authentication. An attacker could use this flaw to perform a variety
of authentication attacks. (CVE-2011-1184)
Polina Genova discovered that Tomcat incorrectly created log entries
with passwords when encountering errors during JMX user creation. A
local attacker could possibly use this flaw to obtain sensitive
information. This issue only affected Ubuntu 10.04 LTS, 10.10 and
It was discovered that Tomcat incorrectly validated certain request
attributes when sendfile is enabled. A local attacker could bypass
intended restrictions, or cause the JVM to crash, resulting in a
denial of service. (CVE-2011-2526)
It was discovered that Tomcat incorrectly handled certain AJP
requests. A remote attacker could use this flaw to spoof requests,
bypass authentication, and obtain sensitive information. This issue
only affected Ubuntu 10.04 LTS, 10.10 and 11.04. (CVE-2011-3190).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected libtomcat6-java package.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 56746 ()
Bugtraq ID: 48456486674935349762
CVE ID: CVE-2011-1184CVE-2011-2204CVE-2011-2526CVE-2011-3190
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.