ESB-2018.1882.2 - UPDATE [Debian] tomcat7: Multiple vulnerabilities 2018-07-02

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2018.1882.2
                     tomcat7 patched for Debian stable
                                2 July 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           tomcat7
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Provide Misleading Information -- Remote/Unauthenticated
                   Unauthorised Access            -- Remote/Unauthenticated
                   Reduced Security               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-8014 CVE-2018-1305 CVE-2018-1304
                   CVE-2017-12616 CVE-2017-7674 

Reference:         ESB-2018.1630
                   ESB-2018.0652
                   ESB-2017.2017

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
   https://lists.debian.org/debian-lts-announce/2018/07/msg00001.html

Comment: This bulletin contains two (2) Debian security advisories.

Revision History:  July  2 2018: DLA-1400-2: A regression has been patched.
                   June 28 2018: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : tomcat7
Version        : 7.0.56-3+really7.0.88-1
CVE ID         : CVE-2017-7674 CVE-2017-12616 CVE-2018-1304
                 CVE-2018-1305 CVE-2018-8014
Debian Bug     : 802312 898935

Several security vulnerabilities have been discovered in the Tomcat
servlet and JSP engine.

CVE-2017-7674
    The CORS Filter in Apache Tomcat did not add an HTTP Vary header
    indicating that the response varies depending on Origin. This
    permitted client and server side cache poisoning in some
    circumstances.

CVE-2017-12616
    When using a VirtualDirContext with Apache Tomcat it was possible to
    bypass security constraints and/or view the source code of JSPs for
    resources served by the VirtualDirContext using a specially crafted
    request.

CVE-2018-1304
    The URL pattern of "" (the empty string) which exactly maps to the
    context root was not correctly handled in Apache Tomcat when used as
    part of a security constraint definition. This caused the constraint
    to be ignored. It was, therefore, possible for unauthorized users to
    gain access to web application resources that should have been
    protected. Only security constraints with a URL pattern of the empty
    string were affected.

CVE-2018-1305
    Security constraints defined by annotations of Servlets in Apache
    Tomcat were only applied once a Servlet had been loaded. Because
    security constraints defined in this way apply to the URL pattern
    and any URLs below that point, it was possible - depending on the
    order Servlets were loaded - for some security constraints not to be
    applied. This could have exposed resources to users who were not
    authorized to access them.

CVE-2018-8014
    The defaults settings for the CORS filter provided in Apache Tomcat
    are insecure and enable 'supportsCredentials' for all origins. It is
    expected that users of the CORS filter will have configured it
    appropriately for their environment rather than using it in the
    default configuration. Therefore, it is expected that most users
    will not be impacted by this issue.

For Debian 8 "Jessie", these problems have been fixed in version
7.0.56-3+really7.0.88-1.

We recommend that you upgrade your tomcat7 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=Fyo9
- -----END PGP SIGNATURE-----

- --------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : tomcat7
Version        : 7.0.56-3+really7.0.88-2
Debian Bug     : 902670

The security update of Tomcat 7 announced as DLA-1400-1 introduced a
regression for applications that make use of the Equinox OSGi
framework. The MANIFEST file of tomcat-jdbc.jar in libtomcat7-java
contains an invalid version number which was automatically derived
from the Debian package version. This caused an OSGi exception.

For Debian 8 "Jessie", this issue has been fixed in version
7.0.56-3+really7.0.88-2.

We recommend that you upgrade your tomcat7 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=kxZw
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=yfk/
-----END PGP SIGNATURE-----

« Back to bulletins