First published: Thu Oct 27 2016(Updated: )
Last updated 24 July 2024
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tomcat6 | ||
redhat/tomcat | <6.0.47 | 6.0.47 |
redhat/tomcat | <7.0.72 | 7.0.72 |
redhat/tomcat | <8.5.5 | 8.5.5 |
redhat/tomcat | <8.0.37 | 8.0.37 |
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.72 | 7.0.72 |
maven/org.apache.tomcat:tomcat | >=8.0.0<=8.0.36 | 8.0.37 |
maven/org.apache.tomcat:tomcat | >=8.5.0<=8.5.4 | 8.5.5 |
maven/org.apache.tomcat:tomcat | >=9.0.0.M1<=9.0.0.M9 | 9.0.0.M10 |
Apache Tomcat | >=6.0.0<=6.0.45 | |
Apache Tomcat | >=7.0.0<=7.0.70 | |
Apache Tomcat | >=8.0<=8.0.36 | |
Apache Tomcat | >=8.5.0<=8.5.4 | |
Apache Tomcat | =9.0.0-milestone1 | |
Apache Tomcat | =9.0.0-milestone2 | |
Apache Tomcat | =9.0.0-milestone3 | |
Apache Tomcat | =9.0.0-milestone4 | |
Apache Tomcat | =9.0.0-milestone5 | |
Apache Tomcat | =9.0.0-milestone6 | |
Apache Tomcat | =9.0.0-milestone7 | |
Apache Tomcat | =9.0.0-milestone8 | |
Apache Tomcat | =9.0.0-milestone9 | |
Oracle Tekelec Platform Distribution | >=7.4.0<=7.7.1 | |
Debian | =8.0 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Shift | ||
NetApp Snap Creator Framework | ||
Ubuntu | =16.04 | |
Red Hat JBoss Enterprise Web Server | =3.0.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.4 | |
redhat enterprise Linux eus | =7.5 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =7.0 | |
Apache Tomcat | =9.0.0-m1 | |
Apache Tomcat | =9.0.0-m2 | |
Apache Tomcat | =9.0.0-m3 | |
Apache Tomcat | =9.0.0-m4 | |
Apache Tomcat | =9.0.0-m5 | |
Apache Tomcat | =9.0.0-m6 | |
Apache Tomcat | =9.0.0-m7 | |
Apache Tomcat | =9.0.0-m8 | |
Apache Tomcat | =9.0.0-m9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-6797 is considered medium due to its potential for unauthorized access to global JNDI resources.
To fix CVE-2016-6797, update to Tomcat version 6.0.47, 7.0.72, 8.0.37, 8.5.5, or 9.0.0.M10.
Affected versions of Tomcat include 6.0.0 to 6.0.45, 7.0.0 to 7.0.70, 8.0.0 to 8.0.36, and 8.5.0 to 8.5.4.
The risk associated with CVE-2016-6797 is that a vulnerable web application could access sensitive global JNDI resources without proper authorization.
A potential workaround for CVE-2016-6797 includes restricting access to JNDI resources through appropriate security configurations.