Scientific Linux Security Update : tomcat6 on SL6.x i386/x86_64

Medium Nessus Plugin ID 60985


The remote Scientific Linux host is missing one or more security updates.


A denial of service flaw was found in the way certain strings were converted to Double objects. A remote attacker could use this flaw to cause Tomcat to hang via a specially crafted HTTP request.

A flaw was found in the Tomcat NIO (Non-Blocking I/O) connector. A remote attacker could use this flaw to cause a denial of service (out-of-memory condition) via a specially crafted request containing a large NIO buffer size request value. (CVE-2011-0534)

This update also fixes the following bug :

- A bug in the 'tomcat6' init script prevented additional Tomcat instances from starting. As well, running 'service tomcat6 start' caused configuration options applied from '/etc/sysconfig/tomcat6' to be overwritten with those from '/etc/tomcat6/tomcat6.conf'. With this update, multiple instances of Tomcat run as expected.

Tomcat must be restarted for this update to take effect.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 60985

File Name: sl_20110309_tomcat6_on_SL6_x.nasl

Version: $Revision: 1.5 $

Type: local

Agent: unix

Published: 2012/08/01

Modified: 2016/05/12

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/03/09

Reference Information

CVE: CVE-2010-4476, CVE-2011-0534