Scientific Linux Security Update : tomcat6 on SL6.x (noarch)

Medium Nessus Plugin ID 66665

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A flaw was found in the way the tomcat6 init script handled the tomcat6-initd.log log file. A malicious web application deployed on Tomcat could use this flaw to perform a symbolic link attack to change the ownership of an arbitrary system file to that of the tomcat user, allowing them to escalate their privileges to root. (CVE-2013-1976)

Note: With this update, tomcat6-initd.log has been moved from /var/log/tomcat6/ to the /var/log/ directory.

It was found that the SLSA-2013:0623 update did not correctly fix CVE-2012-5887, a weakness in the Tomcat DIGEST authentication implementation. A remote attacker could use this flaw to perform replay attacks in some circumstances. Additionally, this problem also prevented users from being able to authenticate using DIGEST authentication. (CVE-2013-2051)

Tomcat must be restarted for this update to take effect.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?bcf2c088

Plugin Details

Severity: Medium

ID: 66665

File Name: sl_20130528_tomcat6_on_SL6_x.nasl

Version: 1.4

Type: local

Agent: unix

Published: 2013/05/29

Updated: 2018/12/31

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2013/05/28

Reference Information

CVE: CVE-2012-5887, CVE-2013-1976, CVE-2013-2051