Language:
http://www.nessus.org/u?ee604d07
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=1441205
https://bugzilla.redhat.com/show_bug.cgi?id=1441223
https://bugzilla.redhat.com/show_bug.cgi?id=1443635
https://bugzilla.redhat.com/show_bug.cgi?id=1459158
https://issues.redhat.com/browse/JWS-657
https://issues.redhat.com/browse/JWS-667
https://issues.redhat.com/browse/JWS-695
https://issues.redhat.com/browse/JWS-709
https://issues.redhat.com/browse/JWS-716
https://issues.redhat.com/browse/JWS-717
https://issues.redhat.com/browse/JWS-725
Severity: Critical
ID: 112177
File Name: redhat-RHSA-2017-1801.nasl
Version: 1.10
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 8/29/2018
Updated: 4/29/2025
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Vendor Severity: Important
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2019-17571
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:tomcat8-lib, p-cpe:/a:redhat:enterprise_linux:log4j-eap6, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:tomcat8-admin-webapps, p-cpe:/a:redhat:enterprise_linux:tomcat8-servlet-3.1-api, p-cpe:/a:redhat:enterprise_linux:tomcat7-javadoc, p-cpe:/a:redhat:enterprise_linux:tomcat7-selinux, p-cpe:/a:redhat:enterprise_linux:tomcat-native, p-cpe:/a:redhat:enterprise_linux:tomcat8-webapps, p-cpe:/a:redhat:enterprise_linux:tomcat7-log4j, p-cpe:/a:redhat:enterprise_linux:tomcat7-docs-webapp, p-cpe:/a:redhat:enterprise_linux:tomcat7-admin-webapps, p-cpe:/a:redhat:enterprise_linux:tomcat8-log4j, p-cpe:/a:redhat:enterprise_linux:tomcat7, p-cpe:/a:redhat:enterprise_linux:tomcat8-javadoc, p-cpe:/a:redhat:enterprise_linux:tomcat7-el-2.2-api, p-cpe:/a:redhat:enterprise_linux:tomcat7-webapps, p-cpe:/a:redhat:enterprise_linux:tomcat8-jsp-2.3-api, p-cpe:/a:redhat:enterprise_linux:tomcat7-jsvc, p-cpe:/a:redhat:enterprise_linux:tomcat8-jsvc, p-cpe:/a:redhat:enterprise_linux:tomcat7-jsp-2.2-api, p-cpe:/a:redhat:enterprise_linux:tomcat8-docs-webapp, p-cpe:/a:redhat:enterprise_linux:tomcat8-selinux, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:tomcat8, p-cpe:/a:redhat:enterprise_linux:tomcat8-el-2.2-api, p-cpe:/a:redhat:enterprise_linux:tomcat7-lib, p-cpe:/a:redhat:enterprise_linux:tomcat7-servlet-3.0-api
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/25/2017
Vulnerability Publication Date: 9/26/2016
CVE: CVE-2016-6304, CVE-2016-7056, CVE-2016-8610, CVE-2017-5645, CVE-2017-5647, CVE-2017-5648, CVE-2017-5664, CVE-2017-7674, CVE-2019-17571