First published: Tue Mar 26 2013(Updated: )
A security flaw was found in the way init script implementation of the Tomcat service, an Apache Servlet/JSP Engine, as used in various versions of Red Hat Enterprise Linux and Fedora, performed management of Tomcat log file. A local attacker could use this flaw to cause denial of service or, potentially, execute arbitrary code with the privileges of the privileged system user (root) via symbolic link attacks on Tomcat log file. Acknowledgements: Red Hat would like to thank Simon Fayer of Imperial College London for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Web Server | =1.0.2 | |
Red Hat JBoss Enterprise Web Server | =2.0.0 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1976 is classified as a medium severity vulnerability.
To fix CVE-2013-1976, update Red Hat JBoss Enterprise Web Server and Red Hat Enterprise Linux to versions that include the security patches.
CVE-2013-1976 affects Red Hat JBoss Enterprise Web Server versions 1.0.2 and 2.0.0, as well as Red Hat Enterprise Linux versions 5 and 6.0.
CVE-2013-1976 can be exploited by a local attacker to cause denial of service.
CVE-2013-1976 was disclosed in August 2013.