USN-2302-1: Tomcat vulnerabilities
Ubuntu Security Notice USN-2302-1
30th July, 2014
tomcat6, tomcat7 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Several security issues were fixed in Tomcat.
- tomcat6 - Servlet and JSP engine
- tomcat7 - Servlet and JSP engine
David Jorm discovered that Tomcat incorrectly handled certain requests
submitted using chunked transfer encoding. A remote attacker could use this
flaw to cause the Tomcat server to consume resources, resulting in a denial
of service. (CVE-2014-0075)
It was discovered that Tomcat did not properly restrict XSLT stylesheets.
An attacker could use this issue with a crafted web application to bypass
security-manager restrictions and read arbitrary files. (CVE-2014-0096)
It was discovered that Tomcat incorrectly handled certain Content-Length
headers. A remote attacker could use this flaw in configurations where
Tomcat is behind a reverse proxy to perform HTTP request smuggling attacks.
The problem can be corrected by updating your system to the following package version:
- Ubuntu 14.04 LTS:
- libtomcat7-java 7.0.52-1ubuntu0.1
- Ubuntu 12.04 LTS:
- libtomcat6-java 6.0.35-1ubuntu3.5
- Ubuntu 10.04 LTS:
- libtomcat6-java 6.0.24-2ubuntu1.16
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.