Ubuntu 12.04 LTS / 14.04 LTS / 15.10 / 16.04 LTS : tomcat6, tomcat7 vulnerabilities (USN-3024-1)

Ubuntu Security Notice (C) 2016 Canonical, Inc. / NASL script (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related
patches.

Description :

It was discovered that Tomcat incorrectly handled pathnames used by
web applications in a getResource, getResourceAsStream, or
getResourcePaths call. A remote attacker could use this issue to
possibly list a parent directory . This issue only affected Ubuntu
12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. (CVE-2015-5174)

It was discovered that the Tomcat mapper component incorrectly handled
redirects. A remote attacker could use this issue to determine the
existence of a directory. This issue only affected Ubuntu 12.04 LTS,
Ubuntu 14.04 LTS and Ubuntu 15.10. (CVE-2015-5345)

It was discovered that Tomcat incorrectly handled different session
settings when multiple versions of the same web application was
deployed. A remote attacker could possibly use this issue to hijack
web sessions. This issue only affected Ubuntu 14.04 LTS and Ubuntu
15.10. (CVE-2015-5346)

It was discovered that the Tomcat Manager and Host Manager
applications incorrectly handled new requests. A remote attacker could
possibly use this issue to bypass CSRF protection mechanisms. This
issue only affected Ubuntu 14.04 LTS and Ubuntu 15.10. (CVE-2015-5351)

It was discovered that Tomcat did not place StatusManagerServlet on
the RestrictedServlets list. A remote attacker could possibly use this
issue to read arbitrary HTTP requests, including session ID values.
This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu
15.10. (CVE-2016-0706)

It was discovered that the Tomcat session-persistence implementation
incorrectly handled session attributes. A remote attacker could
possibly use this issue to execute arbitrary code in a privileged
context. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS
and Ubuntu 15.10. (CVE-2016-0714)

It was discovered that the Tomcat setGlobalContext method incorrectly
checked if callers were authorized. A remote attacker could possibly
use this issue to read or wite to arbitrary application data, or cause
a denial of service. This issue only affected Ubuntu 12.04 LTS, Ubuntu
14.04 LTS and Ubuntu 15.10. (CVE-2016-0763)

It was discovered that the Tomcat Fileupload library incorrectly
handled certain upload requests. A remote attacker could possibly use
this issue to cause a denial of service. (CVE-2016-3092).

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected libtomcat6-java and / or libtomcat7-java packages.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 91954 ()

Bugtraq ID:

CVE ID: CVE-2015-5174
CVE-2015-5345
CVE-2015-5346
CVE-2015-5351
CVE-2016-0706
CVE-2016-0714
CVE-2016-0763
CVE-2016-3092

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now