First published: Tue Mar 26 2013(Updated: )
A security flaw was found in the way init script implementation of the Tomcat service, an Apache Servlet/JSP Engine, as used in various versions of Red Hat Enterprise Linux and Fedora, performed management of Tomcat log file. A local attacker could use this flaw to cause denial of service or, potentially, execute arbitrary code with the privileges of the privileged system user (root) via symbolic link attacks on Tomcat log file. Acknowledgements: Red Hat would like to thank Simon Fayer of Imperial College London for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Tomcat | ||
Red Hat Enterprise Linux | ||
Fedora |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-927622 is classified as a moderate security flaw.
To fix REDHAT-BUG-927622, users should update their Apache Tomcat installation or apply the relevant patches provided in the security advisories.
REDHAT-BUG-927622 affects users of various versions of Red Hat Enterprise Linux and Fedora that utilize Apache Tomcat.
The impact of REDHAT-BUG-927622 includes potential denial of service caused by local attackers exploiting the vulnerability.
No, REDHAT-BUG-927622 requires local access for exploitation.