Debian alert DLA-2077-1 (tomcat7)
| From: | Markus Koschany <apo@debian.org> | |
| To: | debian-lts-announce@lists.debian.org | |
| Subject: | [SECURITY] [DLA 2077-1] tomcat7 security update | |
| Date: | Tue, 28 Jan 2020 00:13:25 +0100 | |
| Message-ID: | <e6cc490d-6251-2f34-4fd8-e7c01243f715@debian.org> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : tomcat7 Version : 7.0.56-3+really7.0.99-1 CVE ID : CVE-2019-12418 CVE-2019-17563 Two security vulnerabilities have been fixed in the Tomcat servlet and JSP engine. CVE-2019-12418 When Apache Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance. CVE-2019-17563 When using FORM authentication with Apache Tomcat there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability. For Debian 8 "Jessie", these problems have been fixed in version 7.0.56-3+really7.0.99-1. We recommend that you upgrade your tomcat7 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAl4vbpVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeTbxBAAzc62ArkCBu+gjsj+x8NPsIoLu5CM1g66VkDQdBt1EFPmnjR8AbmqnHkJ vxzBlnFkBzmO8TaM5rG/JmZpfC/aTJWlwdFk9pQAfYmpFE38PUbhw+7IBEaDqBQT iaZpKAWRNOsLX1OEd+AGJu4FdE7anqv2xul3sxXFMV1zYjTssPAgWMAyyZKno+b5 wYHGmCdjgmWujHwHqgTcAz4xqVrqs2R7Yum2rBuoeYbWBcu4N1OAXEVYBlM+MppM NQG2A1pnV1Z+7yTh9aD2ZPHG5csy19000WfNsVXtFoTIexsgKVfnRJy7wQz6lZbc P9eOU4gCU31D5f3ls8marxxohrrzAtOfgRWeaxWxARs+l+YoUuvx0ttCRI3lWPRj KTZYEbm+oyhynC5pXZnp9D+RXKtSKgWb7lkVkC/jnO+zot3BtMjZbpP+uXiCNfqb zNIB5rbm4Qb4P9WYh+uFi8xJTg2KYHYGCIaOAg4uxH4X4eBQZ0i31sDyFv2sXpHt WQaxPHTrOmN1p+gaxGSTA8ac67v8nerByx/IdWVYqTQlSsxWiVneTUyMvguLSsrD QS3WAO6YANgmUhHsXhRD/kJfX6HPQwq1t59HjxRu7KuPkWPPzwDaWWUB8X9nymSb 6n4Y9i9uVuzQlSp+ygVtxfoOtgk51t38nznnkwpglTBSO+dyWoc= =7LK2 -----END PGP SIGNATURE-----
