SB2017051529 - OpenSUSE Linux update for tomcat
Published: May 15, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2016-8745)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists to error within the send file code for the NIO HTTP connector, which causes current Processor object being added to the Processor cache multiple times. This behavior means that sharing the same Processor for concurrent requests can lead to leakage of potentially sensitive information between requests, such as session ID, request body, etc.
Successful exploitation of the vulnerability may allow an attacker to obtain potentially sensitive information.
2) Information disclosure (CVE-ID: CVE-2017-5647)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists in the handling of the pipelined requests when send file was used resulted in the pipelined request being lost when send file processing of the previous request completed. A remote attacker can cause responses to appear to be sent for the wrong request.
3) Security restrictions bypass (CVE-ID: CVE-2017-5648)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to the failure to use the appropriate facade object by certain application listener calls. A remote attacker can access and modify arbitrary data.
Remediation
Install update from vendor's website.