Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200705-03 ] Tomcat: Information disclosure
Date: Tue, 01 May 2007 19:15:52
Message-Id: 20070501185347.GE426@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200705-03
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Low
8 Title: Tomcat: Information disclosure
9 Date: May 01, 2007
10 Bugs: #173122
11 ID: 200705-03
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability has been discovered in Tomcat that allows for the
19 disclosure of sensitive information.
20
21 Background
22 ==========
23
24 Tomcat is the Apache Jakarta Project's official implementation of Java
25 Servlets and Java Server Pages.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 www-servers/tomcat < 5.5.22 >= 5.5.22
34
35 Description
36 ===========
37
38 Tomcat allows special characters like slash, backslash or URL-encoded
39 backslash as a separator, while Apache does not.
40
41 Impact
42 ======
43
44 A remote attacker could send a specially crafted URL to the vulnerable
45 Tomcat server, possibly resulting in a directory traversal and read
46 access to arbitrary files with the privileges of the user running
47 Tomcat. Note that this vulnerability can only be exploited when using
48 apache proxy modules like mod_proxy, mod_rewrite or mod_jk.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All Tomcat users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=www-servers/tomcat-5.5.22"
62
63 References
64 ==========
65
66 [ 1 ] CVE-2007-0450
67 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450
68
69 Availability
70 ============
71
72 This GLSA and any updates to it are available for viewing at
73 the Gentoo Security Website:
74
75 http://security.gentoo.org/glsa/glsa-200705-03.xml
76
77 Concerns?
78 =========
79
80 Security is a primary focus of Gentoo Linux and ensuring the
81 confidentiality and security of our users machines is of utmost
82 importance to us. Any security concerns should be addressed to
83 security@g.o or alternatively, you may file a bug at
84 http://bugs.gentoo.org.
85
86 License
87 =======
88
89 Copyright 2007 Gentoo Foundation, Inc; referenced text
90 belongs to its owner(s).
91
92 The contents of this document are licensed under the
93 Creative Commons - Attribution / Share Alike license.
94
95 http://creativecommons.org/licenses/by-sa/2.5