-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3415
                    USN-4557-1: Tomcat vulnerabilities
                              1 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Tomcat
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Cross-site Scripting     -- Remote with User Interaction
                   Access Confidential Data -- Remote with User Interaction
                   Unauthorised Access      -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-8735 CVE-2016-6816 CVE-2016-6797
                   CVE-2016-6796 CVE-2016-6794 CVE-2016-5018
                   CVE-2016-0762  

Reference:         ESB-2017.1892
                   ESB-2017.1595
                   ESB-2017.1560

Original Bulletin: 
   https://usn.ubuntu.com/4557-1/

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-4557-1: Tomcat vulnerabilities
30 September 2020

Several security issues were fixed in Tomcat.
Releases

  o Ubuntu 16.04 LTS

Packages

  o tomcat6 - Servlet and JSP engine

Details

It was discovered that the Tomcat realm implementations incorrectly handled
passwords when a username didn't exist. A remote attacker could possibly
use this issue to enumerate usernames. (CVE-2016-0762)

Alvaro Munoz and Alexander Mirosh discovered that Tomcat incorrectly
limited use of a certain utility method. A malicious application could
possibly use this to bypass Security Manager restrictions. (CVE-2016-5018)

It was discovered that Tomcat incorrectly controlled reading system
properties. A malicious application could possibly use this to bypass
Security Manager restrictions. (CVE-2016-6794)

It was discovered that Tomcat incorrectly controlled certain configuration
parameters. A malicious application could possibly use this to bypass
Security Manager restrictions. (CVE-2016-6796)

It was discovered that Tomcat incorrectly limited access to global JNDI
resources. A malicious application could use this to access any global JNDI
resource without an explicit ResourceLink. (CVE-2016-6797)

Regis Leroy discovered that Tomcat incorrectly filtered certain invalid
characters from the HTTP request line. A remote attacker could possibly
use this issue to inject data into HTTP responses. (CVE-2016-6816)

Pierre Ernst discovered that the Tomcat JmxRemoteLifecycleListener did not
implement a recommended fix. A remote attacker could possibly use this
issue to execute arbitrary code. (CVE-2016-8735)

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 16.04

  o libservlet2.5-java - 6.0.45+dfsg-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References

  o CVE-2016-6797
  o CVE-2016-6816
  o CVE-2016-6794
  o CVE-2016-5018
  o CVE-2016-8735
  o CVE-2016-6796
  o CVE-2016-0762

Related notices

  o USN-3177-1 : tomcat8, tomcat7, libtomcat6-java, libtomcat8-java,
    libtomcat7-java, tomcat6

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=v113
-----END PGP SIGNATURE-----