First published: Mon Jan 27 2020(Updated: )
It was discovered that Tomcat incorrectly handled the RMI registry when configured with the JMX Remote Lifecycle Listener. A local attacker could possibly use this issue to obtain credentials and gain complete control over the Tomcat instance. (CVE-2019-12418) It was discovered that Tomcat incorrectly handled FORM authentication. A remote attacker could possibly use this issue to perform a session fixation attack. (CVE-2019-17563)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libtomcat8-java | <8.0.32-1ubuntu1.11 | 8.0.32-1ubuntu1.11 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/tomcat8 | <8.0.32-1ubuntu1.11 | 8.0.32-1ubuntu1.11 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4251-1 is considered high due to the potential for local attackers to gain complete control over the Tomcat instance.
To fix USN-4251-1, update the affected packages to version 8.0.32-1ubuntu1.11 on Ubuntu 16.04.
Users running Tomcat 8 on Ubuntu 16.04 are affected by USN-4251-1.
USN-4251-1 is caused by improper handling of the RMI registry when configured with the JMX Remote Lifecycle Listener.
Disabling the JMX Remote Lifecycle Listener can mitigate the risk associated with USN-4251-1 until a patch is applied.