From Mageia wiki
Jump to: navigation, search

MGASA-2013-0015

Date: January 18th, 2013
Affected releases: 2


Description:
Updated tomcat6 and tomcat packages fixes security vulnerabilities:

java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO
connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not
properly restrict the request-header size, which allows remote attackers to
cause a denial of service (memory consumption) via a large amount of header
data (CVE-2012-2733).

org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36
and 7.x before 7.0.30, when FORM authentication is used, allows remote
attackers to bypass security-constraint checks by leveraging a previous
setUserPrincipal call and then placing /j_security_check at the end of a
URI (CVE-2012-3546).

org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x
before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the
cross-site request forgery (CSRF) protection mechanism via a request that
lacks a session identifier (CVE-2012-4431).

org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before
6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction
with sendfile and HTTPS, allows remote attackers to cause a denial of
service (infinite loop) by terminating the connection during the reading of
a response (CVE-2012-4534).

The replay-countermeasure functionality in the HTTP Digest Access
Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x
before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce)
values instead of nonce (aka server nonce) and nc (aka nonce-count) values,
which makes it easier for remote attackers to bypass intended access
restrictions by sniffing the network for valid requests (CVE-2012-5885).

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x
before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information
about the authenticated user within the session state, which makes it easier
for remote attackers to bypass authentication via vectors related to the
session ID (CVE-2012-5886).

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x
before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly
check for stale nonce values in conjunction with enforcement of proper
credentials, which makes it easier for remote attackers to bypass intended
access restrictions by sniffing the network for valid requests
(CVE-2012-5887).


Updated Packages:
noarch:
tomcat6-6.0.35-4.2.mga2.noarch.rpm
tomcat6-admin-webapps-6.0.35-4.2.mga2.noarch.rpm
tomcat6-docs-webapp-6.0.35-4.2.mga2.noarch.rpm
tomcat6-el-2.1-api-6.0.35-4.2.mga2.noarch.rpm
tomcat6-javadoc-6.0.35-4.2.mga2.noarch.rpm
tomcat6-jsp-2.1-api-6.0.35-4.2.mga2.noarch.rpm
tomcat6-lib-6.0.35-4.2.mga2.noarch.rpm
tomcat6-servlet-2.5-api-6.0.35-4.2.mga2.noarch.rpm
tomcat6-webapps-6.0.35-4.2.mga2.noarch.rpm
tomcat-7.0.32-3.mga2.noarch.rpm
tomcat-admin-webapps-7.0.32-3.mga2.noarch.rpm
tomcat-docs-webapp-7.0.32-3.mga2.noarch.rpm
tomcat-el-2.2-api-7.0.32-3.mga2.noarch.rpm
tomcat-javadoc-7.0.32-3.mga2.noarch.rpm
tomcat-jsp-2.2-api-7.0.32-3.mga2.noarch.rpm
tomcat-jsvc-7.0.32-3.mga2.noarch.rpm
tomcat-lib-7.0.32-3.mga2.noarch.rpm
tomcat-servlet-3.0-api-7.0.32-3.mga2.noarch.rpm
tomcat-systemv-7.0.32-3.mga2.noarch.rpm
tomcat-webapps-7.0.32-3.mga2.noarch.rpm

SRPMS:
tomcat6-6.0.35-4.2.mga2.src.rpm
tomcat-7.0.32-3.mga2.src.rpm


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2733
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3546
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4431
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4534
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5885
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5886
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5887
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://www.ubuntu.com/usn/usn-1637-1/
http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094893.html
https://bugs.mageia.org/show_bug.cgi?id=8692