First published: Mon Nov 26 2007(Updated: )
Tomcat is a servlet container for Java Servlet and JavaServer Pages<br>technologies.<br>It was reported Tomcat did not properly handle the following character<br>sequence in a cookie: \" (a backslash followed by a double-quote). It was<br>possible remote attackers could use this failure to obtain sensitive<br>information, such as session IDs, for session hijacking attacks<br>(CVE-2007-3385). <br>Tomcat was found treating single quote characters -- ' -- as delimiters in<br>cookies. This could allow remote attackers to obtain sensitive information,<br>such as session IDs, for session hijacking attacks (CVE-2007-3382).<br>The default Tomcat configuration permitted the use of insecure<br>SSL cipher suites including the anonymous cipher suite. (CVE-2007-1858)<br>Tomcat permitted various characters as path delimiters. If Tomcat was used<br>behind certain proxies and configured to only proxy some contexts, an<br>attacker could construct an HTTP request to work around the context<br>restriction and potentially access non-proxied content. (CVE-2007-0450)<br>Directory listings were enabled by default in Tomcat. Information stored<br>unprotected under the document root was visible to anyone if the<br>administrator did not disable directory listings. (CVE-2006-3835)<br>It was found that generating listings of large directories was CPU<br>intensive. An attacker could make repeated requests to obtain a directory<br>listing of any large directory, leading to a denial of service.<br>(CVE-2005-3510) <br>Tomcat was found to accept multiple content-length headers in a<br>request. This could allow attackers to poison a web-cache, bypass web<br>application firewall protection, or conduct cross-site scripting attacks.<br>(CVE-2005-2090)<br>Users should upgrade to these erratum packages which contain an update to<br>Tomcat that resolves these issues, and add the tyrex and<br>jakarta-commons-pool packages which are required dependencies of the new<br>Tomcat version.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Satellite | ||
Tomcat |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2007:1069 is classified as important due to potential remote code execution.
To fix RHSA-2007:1069, update Tomcat to the latest version as specified in the security advisory.
RHSA-2007:1069 addresses the improper handling of special characters in cookies, which could lead to security issues.
RHSA-2007:1069 affects specific versions of Tomcat prior to the security update.
Yes, remote access is required for an attacker to exploit the vulnerability addressed in RHSA-2007:1069.