Amazon Linux AMI : tomcat6 (ALAS-2011-25)

High Nessus Plugin ID 69584

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.

Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file.

Solution

Run 'yum update tomcat6' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2011-25.html

Plugin Details

Severity: High

ID: 69584

File Name: ala_ALAS-2011-25.nasl

Version: 1.6

Type: local

Agent: unix

Published: 2013/09/04

Updated: 2018/04/18

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:tomcat6, p-cpe:/a:amazon:linux:tomcat6-admin-webapps, p-cpe:/a:amazon:linux:tomcat6-docs-webapp, p-cpe:/a:amazon:linux:tomcat6-el-2.1-api, p-cpe:/a:amazon:linux:tomcat6-javadoc, p-cpe:/a:amazon:linux:tomcat6-jsp-2.1-api, p-cpe:/a:amazon:linux:tomcat6-lib, p-cpe:/a:amazon:linux:tomcat6-servlet-2.5-api, p-cpe:/a:amazon:linux:tomcat6-webapps, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 2011/12/02

Reference Information

CVE: CVE-2011-1184, CVE-2011-2204, CVE-2011-3190

ALAS: 2011-25