The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of Apache Tomcat: privilege escalation

Synthesis of the vulnerability

A local attacker can tamper with the data exchanged by applications hosted in one instance of Apache Tomcat.
Severity of this bulletin: 3/4.
Creation date: 11/04/2017.
Références of this threat: CERTFR-2017-AVI-116, CVE-2017-5648, DLA-924-1, DLA-924-2, DSA-3842-1, DSA-3843-1, FEDORA-2017-5261ba4605, FEDORA-2017-d5aa7c77d6, NTAP-20180605-0001, NTAP-20180607-0001, NTAP-20180607-0002, NTAP-20180614-0001, openSUSE-SU-2017:1292-1, RHSA-2017:1801-01, RHSA-2017:1802-01, RHSA-2017:1809-01, SUSE-SU-2017:1229-1, SUSE-SU-2017:1382-1, SUSE-SU-2017:1660-1, USN-3519-1, VIGILANCE-VUL-22401.

Description of the vulnerability

The Apache Tomcat is a web application server.

It may host several applications which must be isolated. However, an application can get handle objets to requests and responses for other applications, and so read their request or modify their response body.

A local attacker can therefore tamper with the data exchanged by applications hosted in one instance of Apache Tomcat.
Full Vigil@nce bulletin... (Request your free trial)

This computer threat announce impacts software or systems such as Tomcat, Debian, Fedora, Snap Creator Framework, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this computer vulnerability is important.

The trust level is of type confirmed by the editor, with an origin of user account.

An attacker with a expert ability can exploit this cybersecurity alert.

Solutions for this threat

Apache Tomcat: version 8.0.43.
The version 8.0.43 is fixed:
  http://tomcat.apache.org/download-80.cgi#8.0.43

Debian 8: new tomcat8 packages.
New packages are available:
  Debian 8: tomcat8 8.0.14-1+deb8u9

Debian: new tomcat7 packages.
New packages are available:
  Debian 7: tomcat7 7.0.28-4+deb7u13
  Debian 8: tomcat7 7.0.56-3+deb8u10

Fedora: new tomcat packages.
New packages are available:
  Fedora 24: tomcat 8.0.43-1.fc24
  Fedora 25: tomcat 8.0.43-1.fc25

openSUSE Leap: new tomcat packages.
New packages are available:
  openSUSE Leap 42.1: tomcat 8.0.43-17.1
  openSUSE Leap 42.2: tomcat 8.0.43-6.7.1

Red Hat JBoss Web Server: version 3.1 SP1.
The version 3.1 SP1 is fixed:
  https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver&downloadType=securityPatches&version=3.1

RHEL 7.3: new tomcat packages (27/07/2017).
New packages are available:
  RHEL 7: tomcat 7.0.69-12.el7_3

Snap Creator Framework: patch for Tomcat.
A patch is available:
  https://mysupport.netapp.com/NOW/download/software/snapcreator_framework/4.3.1P1/

SUSE LE 12: new tomcat packages.
New packages are available:
  SUSE LE 12 SP1: tomcat 8.0.43-10.19.1
  SUSE LE 12 SP2: tomcat 8.0.43-23.1

SUSE LE 12 RTM: new tomcat packages.
New packages are available:
  SUSE LE 12 RTM: tomcat 7.0.78-7.13.4

Ubuntu: new tomcat packages.
New packages are available:
  Ubuntu 17.04: tomcat8 8.0.38-2ubuntu2.2
  Ubuntu 16.04 LTS: tomcat8 8.0.32-1ubuntu1.5
  Ubuntu 14.04 LTS: tomcat7 7.0.52-1ubuntu0.13
Full Vigil@nce bulletin... (Request your free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a network vulnerability note. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.