Debian DSA-2897-1 : tomcat7 - security update

high Nessus Plugin ID 73421
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Debian host is missing a security-related update.

Description

Multiple security issues were found in the Tomcat servlet and JSP engine :

- CVE-2013-2067 FORM authentication associates the most recent request requiring authentication with the current session. By repeatedly sending a request for an authenticated resource while the victim is completing the login form, an attacker could inject a request that would be executed using the victim's credentials.

- CVE-2013-2071 A runtime exception in AsyncListener.onComplete() prevents the request from being recycled. This may expose elements of a previous request to a current request.

- CVE-2013-4286 Reject requests with multiple content-length headers or with a content-length header when chunked encoding is being used.

- CVE-2013-4322 When processing a request submitted using the chunked transfer encoding, Tomcat ignored but did not limit any extensions that were included. This allows a client to perform a limited denial of service by streaming an unlimited amount of data to the server.

- CVE-2014-0050 Multipart requests with a malformed Content-Type header could trigger an infinite loop causing a denial of service.

Solution

Upgrade the tomcat7 packages.

For the stable distribution (wheezy), these problems have been fixed in version 7.0.28-4+deb7u1.

See Also

https://security-tracker.debian.org/tracker/CVE-2013-2067

https://security-tracker.debian.org/tracker/CVE-2013-2071

https://security-tracker.debian.org/tracker/CVE-2013-4286

https://security-tracker.debian.org/tracker/CVE-2013-4322

https://security-tracker.debian.org/tracker/CVE-2014-0050

https://packages.debian.org/source/wheezy/tomcat7

https://www.debian.org/security/2014/dsa-2897

Plugin Details

Severity: High

ID: 73421

File Name: debian_DSA-2897.nasl

Version: 1.9

Type: local

Agent: unix

Published: 4/9/2014

Updated: 1/11/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:tomcat7, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 4/8/2014

Reference Information

CVE: CVE-2013-2067, CVE-2013-2071, CVE-2013-4286, CVE-2013-4322, CVE-2014-0050

BID: 59798, 59799, 65400, 65767, 65773

DSA: 2897