** Summary changed:

- tomcat5.5 has multiple security vulnerabilities
+ [CVE-2007-5333] Unauthorized disclosure of information

** Description changed:

  Binary package hint: tomcat5.5
  
- "The default catalina.policy in the JULI logging component in Apache Tomcat 
5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain 
permissions for web applications, which allows attackers to modify logging 
configuration options and overwrite arbitrary files, as demonstrated by 
changing the (1) level, (2) directory, and (3) prefix attributes in the 
org.apache.juli.FileHandler handler."
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5342
- 
- 
- "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 
4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain 
configurations, allows remote authenticated users to read arbitrary files via a 
WebDAV write request that specifies an entity with a SYSTEM tag."
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461
+ Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 
4.1.36 does not properly handle (1) double quote (") characters or (2) %5C 
(encoded backslash) sequences in a cookie value, which might cause sensitive 
information such as session IDs to be leaked to remote attackers and enable 
session hijacking attacks. NOTE: this issue exists because of an incomplete fix 
for CVE-2007-3385.
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333
  
  Edgy, Feisty, Gutsy and Hardy are affected. Dapper doesn't have the
  package. Fixed version is available in Debian.

** Bug watch added: Debian Bug tracker #465645
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465645

** Also affects: tomcat5.5 (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465645
   Importance: Unknown
       Status: Unknown

-- 
[CVE-2007-5333] Unauthorized disclosure of information
https://bugs.launchpad.net/bugs/220540
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to