First published: Thu Oct 27 2016(Updated: )
Last updated 24 July 2024
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tomcat6 | ||
redhat/tomcat | <6.0.47 | 6.0.47 |
redhat/tomcat | <7.0.72 | 7.0.72 |
redhat/tomcat | <8.5.5 | 8.5.5 |
redhat/tomcat | <8.0.37 | 8.0.37 |
maven/org.apache.tomcat:tomcat | >=9.0.0.M1<=9.0.0.M9 | 9.0.0.M10 |
maven/org.apache.tomcat:tomcat | >=8.1.0<8.5.5 | 8.5.5 |
maven/org.apache.tomcat:tomcat | >=8.0.0<8.0.37 | 8.0.37 |
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.72 | 7.0.72 |
maven/org.apache.tomcat:tomcat | >=6.0.0<6.0.47 | 6.0.47 |
Apache Tomcat | >=6.0.0<=6.0.45 | |
Apache Tomcat | >=7.0.0<=7.0.70 | |
Apache Tomcat | >=8.0<=8.0.36 | |
Apache Tomcat | >=8.5.0<=8.5.4 | |
Apache Tomcat | =9.0.0-milestone1 | |
Apache Tomcat | =9.0.0-milestone2 | |
Apache Tomcat | =9.0.0-milestone3 | |
Apache Tomcat | =9.0.0-milestone4 | |
Apache Tomcat | =9.0.0-milestone5 | |
Apache Tomcat | =9.0.0-milestone6 | |
Apache Tomcat | =9.0.0-milestone7 | |
Apache Tomcat | =9.0.0-milestone8 | |
Apache Tomcat | =9.0.0-milestone9 | |
Debian | =8.0 | |
Red Hat JBoss Enterprise Web Server | =3.0.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.4 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise Linux Server EUS | =7.6 | |
Red Hat Enterprise Linux Server EUS | =7.7 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Shift | ||
NetApp Snap Creator Framework | ||
Ubuntu Linux | =16.04 | |
Oracle Tekelec Platform Distribution | >=7.4.0<=7.7.1 | |
Apache Tomcat | =9.0.0-m1 | |
Apache Tomcat | =9.0.0-m2 | |
Apache Tomcat | =9.0.0-m3 | |
Apache Tomcat | =9.0.0-m4 | |
Apache Tomcat | =9.0.0-m5 | |
Apache Tomcat | =9.0.0-m6 | |
Apache Tomcat | =9.0.0-m7 | |
Apache Tomcat | =9.0.0-m8 | |
Apache Tomcat | =9.0.0-m9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6794 is classified as a moderate severity vulnerability.
To fix CVE-2016-6794, update Tomcat to version 6.0.47 or later, 7.0.72 or later, 8.0.37 or later, or 8.5.5 or later.
CVE-2016-6794 affects Apache Tomcat versions prior to 6.0.47, 7.0.72, 8.0.37, and 8.5.5, as well as earlier milestone versions of Tomcat 9.0.
CVE-2016-6794 exploits the improper control of a web application’s ability to read system properties when a SecurityManager is configured.
While updating to the fixed versions is recommended, temporarily disabling the system property replacement feature in Tomcat can mitigate some risks associated with CVE-2016-6794.