This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200804-10
(Tomcat: Multiple vulnerabilities)
The following vulnerabilities were reported:
Delian Krustev discovered that the JULI logging component does not
properly enforce access restrictions, allowing web application to add
or overwrite files (CVE-2007-5342).
When the native APR connector is used, Tomcat does not properly handle
an empty request to the SSL port, which allows remote attackers to
trigger handling of a duplicate copy of one of the recent requests
If the processing or parameters is interrupted, i.e. by an exception,
then it is possible for the parameters to be processed as part of later
An absolute path traversal vulnerability exists due to the way that
WebDAV write requests are handled (CVE-2007-5461).
Tomcat does not properly handle double quote (') characters or %5C
(encoded backslash) sequences in a cookie value, which might cause
sensitive information such as session IDs to be leaked to remote
attackers and enable session hijacking attacks
These vulnerabilities can be exploited by:
a malicious web application to add or overwrite files with the
permissions of the user running Tomcat.
a remote attacker to conduct session hijacking or disclose sensitive
There is no known workaround at this time.
See also :
All Tomcat 5.5.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-servers/tomcat-5.5.26'
All Tomcat 6.0.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-servers/tomcat-6.0.16'
Risk factor :
Medium / CVSS Base Score : 6.4
Family: Gentoo Local Security Checks
Nessus Plugin ID: 31957 (gentoo_GLSA-200804-10.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now