The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of Apache Tomcat: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Apache Tomcat.
Severity of this bulletin: 3/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 11/04/2017.
Références of this threat: CERTFR-2017-AVI-116, cpujul2017, CVE-2017-5650, CVE-2017-5651, NTAP-20180605-0001, NTAP-20180607-0001, NTAP-20180607-0002, NTAP-20180614-0001, VIGILANCE-VUL-22395.

Description of the vulnerability

Several vulnerabilities were announced in Apache Tomcat.

An attacker can make the server send to him the response of a not related request. [severity:3/4; CVE-2017-5651]

An attacker can send HTTP/2 requests which will block all server threads, in order to trigger a denial of service. [severity:3/4; CVE-2017-5650]
Full Vigil@nce bulletin... (Request your free trial)

This security vulnerability impacts software or systems such as Tomcat, MariaDB ~ precise, MySQL Community, MySQL Enterprise, Snap Creator Framework, Percona Server.

Our Vigil@nce team determined that the severity of this computer weakness bulletin is important.

The trust level is of type confirmed by the editor, with an origin of internet client.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this security note.

Solutions for this threat

Apache Tomcat: version 8.5.13.
The version 8.5.13 is fixed:

Oracle MySQL: version 5.5.57.
The version 5.5.57 is fixed:

Oracle MySQL: version 5.6.37.
The version 5.6.37 is fixed:

Oracle MySQL: version 5.7.19.
The version 5.7.19 is fixed:

Snap Creator Framework: patch for Tomcat.
A patch is available:
Full Vigil@nce bulletin... (Request your free trial)

Computer vulnerabilities tracking service

Vigil@nce provides software vulnerabilities announces. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.