2008-04-22 21:38:04 |
Matti Lindell |
description |
Binary package hint: tomcat5.5
"The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler."
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5342
"Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag."
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461
Edgy, Feisty, Gutsy and Hardy are affected. Dapper doesn't have the package. Fixed version is available in Debian. |
Binary package hint: tomcat5.5
Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333
Edgy, Feisty, Gutsy and Hardy are affected. Dapper doesn't have the package. Fixed version is available in Debian. |
|