First published: Wed Sep 30 2020(Updated: )
It was discovered that the Tomcat realm implementations incorrectly handled passwords when a username didn't exist. A remote attacker could possibly use this issue to enumerate usernames. (CVE-2016-0762) Alvaro Munoz and Alexander Mirosh discovered that Tomcat incorrectly limited use of a certain utility method. A malicious application could possibly use this to bypass Security Manager restrictions. (CVE-2016-5018) It was discovered that Tomcat incorrectly controlled reading system properties. A malicious application could possibly use this to bypass Security Manager restrictions. (CVE-2016-6794) It was discovered that Tomcat incorrectly controlled certain configuration parameters. A malicious application could possibly use this to bypass Security Manager restrictions. (CVE-2016-6796) It was discovered that Tomcat incorrectly limited access to global JNDI resources. A malicious application could use this to access any global JNDI resource without an explicit ResourceLink. (CVE-2016-6797) Regis Leroy discovered that Tomcat incorrectly filtered certain invalid characters from the HTTP request line. A remote attacker could possibly use this issue to inject data into HTTP responses. (CVE-2016-6816) Pierre Ernst discovered that the Tomcat JmxRemoteLifecycleListener did not implement a recommended fix. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2016-8735)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libservlet2.5-java | <6.0.45+dfsg-1ubuntu0.1 | 6.0.45+dfsg-1ubuntu0.1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-4557-1 is classified as a medium severity vulnerability.
To fix USN-4557-1, update the affected package libservlet2.5-java to version 6.0.45+dfsg-1ubuntu0.1 or later.
USN-4557-1 affects Ubuntu 16.04 systems that have the libservlet2.5-java package installed.
USN-4557-1 involves improper handling of passwords which may allow remote attackers to enumerate usernames.
The vulnerability in USN-4557-1 was discovered by Alvaro Munoz and Alexander Mirosh.