Your message dated Tue, 01 Aug 2006 16:44:22 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Bug#380361: tomcat5: CVE-2006-3835: remote directory listing
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: tomcat5
Severity: serious
Tags: security
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
CVE-2006-3835: "Apache Tomcat 5 before 5.5.17 allows remote attackers to
list directories via a semicolon (;) preceding a filename with a mapped
extension, as demonstrated by URLs ending with /;index.jsp and
/;help.do."
The original report to full-disclosure [1] indicates that the 5.0.x
series is also affected. The reporter claims to have verified it with
5.0.28; I have not tried to reproduce it with Debian's 5.0.30.
Please mention the CVE in your changelog.
Thanks,
Alec
[1] http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0467.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFEy28UAud/2YgchcQRAn/cAKCOlXEy+3bcG3yIrx4oRwuMGmuYKACgtf6c
ota7g+uR5br2mvfZRoHicAo=
=DH9m
-----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Alec Berryman wrote:
> Package: tomcat5
> Severity: serious
> Tags: security
>
> CVE-2006-3835: "Apache Tomcat 5 before 5.5.17 allows remote attackers to
> list directories via a semicolon (;) preceding a filename with a mapped
> extension, as demonstrated by URLs ending with /;index.jsp and
> /;help.do."
>
> The original report to full-disclosure [1] indicates that the 5.0.x
> series is also affected. The reporter claims to have verified it with
> 5.0.28; I have not tried to reproduce it with Debian's 5.0.30.
I can't reproduce the attack with 5.0.30. I'll upgrade the 5.5 serie.
Thanks for your report.
- --
.''`.
: :' :rnaud
`. `'
`-
Java Trap: http://www.gnu.org/philosophy/java-trap.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEz2jG4vzFZu62tMIRAtPjAJ4kjCAUEqnHYKdri/008izRCJIyMwCfWrkA
z9v3b2DVjksqDfx1IwpWNgE=
=tu5o
-----END PGP SIGNATURE-----
--- End Message ---