SuSE 10 Security Update : Tomcat 5 (ZYPP Patch Number 5955)

medium Nessus Plugin ID 41591
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 4.2


The remote SuSE 10 host is missing a security-related patch.


Two old but not yet fixed security issues in tomcat5 were spotted and are fixed by this update :

- Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;

Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat allowed remote attackers to inject arbitrary web script or HTML via crafted 'Accept-Language headers that do not conform to RFC 2616'.

These issues were rated 'low' by the Apache Tomcat team.


Apply ZYPP patch number 5955.

See Also

Plugin Details

Severity: Medium

ID: 41591

File Name: suse_tomcat5-5955.nasl

Version: 1.9

Type: local

Agent: unix

Published: 9/24/2009

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: Medium

VPR Score: 4.2

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 1/22/2009

Reference Information

CVE: CVE-2006-3835