Debian dsa-5665 : libtomcat10-embed-java - security update

high Nessus Plugin ID 193448

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 12 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-5665 advisory.

- Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue. (CVE-2023-46589)

- Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-23672)

- Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat.
When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-24549)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the libtomcat10-embed-java packages.

See Also

https://security-tracker.debian.org/tracker/source-package/tomcat10

https://security-tracker.debian.org/tracker/CVE-2023-46589

https://security-tracker.debian.org/tracker/CVE-2024-23672

https://security-tracker.debian.org/tracker/CVE-2024-24549

https://packages.debian.org/source/bookworm/tomcat10

Plugin Details

Severity: High

ID: 193448

File Name: debian_DSA-5665.nasl

Version: 1.0

Type: local

Agent: unix

Published: 4/18/2024

Updated: 4/18/2024

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:N

CVSS Score Source: CVE-2023-46589

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libtomcat10-embed-java, p-cpe:/a:debian:debian_linux:libtomcat10-java, p-cpe:/a:debian:debian_linux:tomcat10, p-cpe:/a:debian:debian_linux:tomcat10-admin, p-cpe:/a:debian:debian_linux:tomcat10-common, p-cpe:/a:debian:debian_linux:tomcat10-docs, p-cpe:/a:debian:debian_linux:tomcat10-examples, p-cpe:/a:debian:debian_linux:tomcat10-user, cpe:/o:debian:debian_linux:12.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 4/17/2024

Vulnerability Publication Date: 8/25/2023

Reference Information

CVE: CVE-2023-46589, CVE-2024-23672, CVE-2024-24549

IAVA: 2023-A-0661-S, 2024-A-0144