copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2007.0532 -- [RedHat] -- Moderate: tomcat security update

Date: 18 July 2007
References: ESB-2007.0423  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2007.0532 -- [RedHat]
                     Moderate: tomcat security update
                               18 July 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Tomcat
Publisher:            Red Hat
Operating System:     Red Hat Enterprise Linux 5
Impact:               Cross-site Scripting
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-2450 CVE-2007-2449

Ref:                  ESB-2007.0423

Original Bulletin:    https://rhn.redhat.com/errata/RHSA-2007-0569.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: tomcat security update
Advisory ID:       RHSA-2007:0569-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0569.html
Issue date:        2007-07-17
Updated on:        2007-07-17
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-2449 CVE-2007-2450 
- - ---------------------------------------------------------------------

1. Summary:

Updated tomcat packages that fix two security issues and a packaging bug
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

Tomcat is a servlet container for Java Servlet and JavaServer Pages (JSP)
technologies.

Some JSPs within the 'examples' web application did not escape user
provided data. If the JSP examples were accessible, this flaw could allow a
remote attacker to perform cross-site scripting attacks (CVE-2007-2449).

Note: it is recommended the 'examples' web application not be installed on
a production system.

The Manager and Host Manager web applications did not escape user provided
data. If a user is logged in to the Manager or Host Manager web
application, an attacker could perform a cross-site scripting attack
(CVE-2007-2450).

Users of Tomcat should update to these erratum packages, which contain
backported patches to correct these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

244804 - CVE-2007-2449 tomcat examples jsp XSS
244808 - CVE-2007-2450 tomcat host manager XSS
244846 - /var/tmp/rpm-tmp.25596: line 5: /usr/bin/rebuild-gcj-db: No such file or directory

6. RPMs required:

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tomcat5-5.5.23-0jpp.1.0.4.el5.src.rpm
15852dbd79c1d28ddc2a607b8c2cced6  tomcat5-5.5.23-0jpp.1.0.4.el5.src.rpm

i386:
e04e3a9648ee9f94f38bd76951d23fb7  tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.i386.rpm
3100ed0342502126a609c5c15e78c764  tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.i386.rpm
47ffd27d607f4755b5da7fa1a65c5c48  tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.i386.rpm

x86_64:
0f3219dedf2d15538133cb8a13310b8b  tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
cbfcdf5f827921a71fda67293f3e44a7  tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
c25daaf3feb30744afc65c08a359635b  tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tomcat5-5.5.23-0jpp.1.0.4.el5.src.rpm
15852dbd79c1d28ddc2a607b8c2cced6  tomcat5-5.5.23-0jpp.1.0.4.el5.src.rpm

i386:
afa9a78630f8858f46db1434ad45fa7b  tomcat5-5.5.23-0jpp.1.0.4.el5.i386.rpm
8c0ecbce40287f71f530360b0a769361  tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.i386.rpm
7f2628a9557c146febed5442c522a6e0  tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.i386.rpm
e04e3a9648ee9f94f38bd76951d23fb7  tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.i386.rpm
bc130f7c90ee690dc860712461ab9f82  tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.i386.rpm
b653cc7d8aae4bb246079a9a9ce950d8  tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.i386.rpm
80429d018c31e87244213a9762ad10d3  tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.i386.rpm
3e564a9d6f0abf8f74ac5fe00cc3de25  tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.i386.rpm
b8f6d1c37c68d463fbdee1426352618d  tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.i386.rpm
7b4b8e5a891d09005bc8a1d2e1194d99  tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.i386.rpm

x86_64:
1db5f282b62d759beda12cf35f83734f  tomcat5-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
74544541ba072e94b9970b5919db3892  tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
3694bc19303c73cd46e75ca23d1051a4  tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
0f3219dedf2d15538133cb8a13310b8b  tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
901f900e947eb38b8d17ef31238523cc  tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
6835af3f3c0b9aa0deddac7e67ed79e0  tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
c4df3c21719e1cf5d38c19491651aa7e  tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
0d5f131c789ca95f59d0886939aa8fe7  tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
66c20908529976c99cbf6bb41eecfbee  tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
672951c48aacff47f1124c896445b887  tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/tomcat5-5.5.23-0jpp.1.0.4.el5.src.rpm
15852dbd79c1d28ddc2a607b8c2cced6  tomcat5-5.5.23-0jpp.1.0.4.el5.src.rpm

i386:
afa9a78630f8858f46db1434ad45fa7b  tomcat5-5.5.23-0jpp.1.0.4.el5.i386.rpm
8c0ecbce40287f71f530360b0a769361  tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.i386.rpm
7f2628a9557c146febed5442c522a6e0  tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.i386.rpm
e04e3a9648ee9f94f38bd76951d23fb7  tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.i386.rpm
bc130f7c90ee690dc860712461ab9f82  tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.i386.rpm
b653cc7d8aae4bb246079a9a9ce950d8  tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.i386.rpm
3100ed0342502126a609c5c15e78c764  tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.i386.rpm
80429d018c31e87244213a9762ad10d3  tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.i386.rpm
3e564a9d6f0abf8f74ac5fe00cc3de25  tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.i386.rpm
47ffd27d607f4755b5da7fa1a65c5c48  tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.i386.rpm
b8f6d1c37c68d463fbdee1426352618d  tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.i386.rpm
7b4b8e5a891d09005bc8a1d2e1194d99  tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.i386.rpm

ia64:
1fbb19614a5c9a5d72c120e29b5094d3  tomcat5-5.5.23-0jpp.1.0.4.el5.ia64.rpm
77b1bf61e1ccb7e2af21d93105951997  tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.ia64.rpm
e1b01f270313d22a6b957c4336352bd6  tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.ia64.rpm
be47ede5989fbd0dc4398d839efd142c  tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.ia64.rpm
e1d93c56b0d3730914fe90694e7db9cd  tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.ia64.rpm
9205bc162daa17e9f6314ed14e1f31bb  tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.ia64.rpm
55ae893c5887213a4cc85cff3f482ec3  tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.ia64.rpm
cf286fcf847a5325c0b3d2c8c1ff1c58  tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.ia64.rpm
b404c9faa4503e4fe41d1fe8b3a4a721  tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.ia64.rpm
d697720c77f93baaada1540e35913198  tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.ia64.rpm
56e8a796da04decd34bee5ba8616c284  tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.ia64.rpm
fd8352214a62573bd2456c252f8fc186  tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.ia64.rpm

ppc:
f8625d3b5ef073ac8de77b1bdf9f01a4  tomcat5-5.5.23-0jpp.1.0.4.el5.ppc.rpm
d7804d9e2ee85e8adaadc3695f9a1fcf  tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.ppc.rpm
861f24537832282f47248a4d494eaad5  tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.ppc.rpm
0dbaa701244414a6babde13da3698129  tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.ppc.rpm
36cee8546f804c0ea91fad586d9db6cd  tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.ppc.rpm
e84767196956742319016c08fc59f4b9  tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.ppc.rpm
05085799e57547f7b95370cf93097ad1  tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.ppc.rpm
a9ff8fe3c28adfacc923accc2e02238f  tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.ppc.rpm
a32d42fb280bb96daa06abd576a315a2  tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.ppc.rpm
37746d0e7931671779fbad9b61877703  tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.ppc.rpm
d91221a346ce66fa021701440b6bc429  tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.ppc.rpm
2d1ab7c457ae33a9fe00f13c6a0f8b6a  tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.ppc.rpm

s390x:
3d86afce9e1b0a269701b5b2225d0ebb  tomcat5-5.5.23-0jpp.1.0.4.el5.s390x.rpm
36b7b3706abeda4f31fdce022e6f266d  tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.s390x.rpm
deabcb46f038caa0aff7f173e2430db7  tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.s390x.rpm
f67b472f1d874f64f287a407f3c8e608  tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.s390x.rpm
3e2c4780d83adf2ec2f75dabeeebc573  tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.s390x.rpm
8e0ecac842e2079335a0a12a588b6cbc  tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.s390x.rpm
3389c6531f4ab0df5644f9a75890f798  tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.s390x.rpm
fb0e8d1800a1154fdf9685e657471db5  tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.s390x.rpm
0a7e68052ce02e1f12561c4ba81804b9  tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.s390x.rpm
36d5b39eab1d8319e35672856ce73732  tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.s390x.rpm
a5b178ad39e13481070be36675b936f0  tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.s390x.rpm
b76e10eb457da5b811e8b340400e872b  tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.s390x.rpm

x86_64:
1db5f282b62d759beda12cf35f83734f  tomcat5-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
74544541ba072e94b9970b5919db3892  tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
3694bc19303c73cd46e75ca23d1051a4  tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
0f3219dedf2d15538133cb8a13310b8b  tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
901f900e947eb38b8d17ef31238523cc  tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
6835af3f3c0b9aa0deddac7e67ed79e0  tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
cbfcdf5f827921a71fda67293f3e44a7  tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
c4df3c21719e1cf5d38c19491651aa7e  tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
0d5f131c789ca95f59d0886939aa8fe7  tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
c25daaf3feb30744afc65c08a359635b  tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
66c20908529976c99cbf6bb41eecfbee  tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.x86_64.rpm
672951c48aacff47f1124c896445b887  tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450
http://tomcat.apache.org/security-5.html
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGnJvQXlSAg2UNWIIRAvWNAKCAmMjPvRMQQAn2bY8ZsznT/MNYCwCeOGkt
Yj7fPKtDEzYnYsW4hs49H5A=
=UBUR
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRp1Etyh9+71yA2DNAQLGtwP+Oa45zhuWra9gzf8m0OOb8mshQpUK8kZ9
xSug/j2F0JlYKHkvJPhhdz55AlPnXvr2SH0C//F7hOx+Z7c8uzI9/IYXQcQrrork
0nKf5hDBupxlHLJXsqFgCoWmDrbt5s65ylR9eJmhVjroCAt1bf7bRPxgG7mrQ74Y
GxJZLp42gDQ=
=aQCI
-----END PGP SIGNATURE-----