Amazon Linux AMI update for tomcat7, tomcat80



Published: 2018-08-10
Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2018-8034
CVE-2018-1336
CVE-2018-8014
CWE-ID CWE-264
CWE-835
CWE-200
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Amazon Linux AMI
Operating systems & Components / Operating system

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Security restrictions bypass

EUVDB-ID: #VU13992

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-8034

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to host name verification when using TLS with the WebSocket client was missing. A remote unauthenticated attacker can bypass security restrictions when using TLS.

Mitigation

Update the affected packages.

noarch:
    tomcat80-lib-8.0.53-1.80.amzn1.noarch
    tomcat80-8.0.53-1.80.amzn1.noarch
    tomcat80-servlet-3.1-api-8.0.53-1.80.amzn1.noarch
    tomcat80-el-3.0-api-8.0.53-1.80.amzn1.noarch
    tomcat80-docs-webapp-8.0.53-1.80.amzn1.noarch
    tomcat80-log4j-8.0.53-1.80.amzn1.noarch
    tomcat80-webapps-8.0.53-1.80.amzn1.noarch
    tomcat80-jsp-2.3-api-8.0.53-1.80.amzn1.noarch
    tomcat80-admin-webapps-8.0.53-1.80.amzn1.noarch
    tomcat80-javadoc-8.0.53-1.80.amzn1.noarch
    tomcat7-el-2.2-api-7.0.90-1.33.amzn1.noarch
    tomcat7-log4j-7.0.90-1.33.amzn1.noarch
    tomcat7-7.0.90-1.33.amzn1.noarch
    tomcat7-javadoc-7.0.90-1.33.amzn1.noarch
    tomcat7-docs-webapp-7.0.90-1.33.amzn1.noarch
    tomcat7-servlet-3.0-api-7.0.90-1.33.amzn1.noarch
    tomcat7-admin-webapps-7.0.90-1.33.amzn1.noarch
    tomcat7-lib-7.0.90-1.33.amzn1.noarch
    tomcat7-jsp-2.2-api-7.0.90-1.33.amzn1.noarch
    tomcat7-webapps-7.0.90-1.33.amzn1.noarch

src:
    tomcat80-8.0.53-1.80.amzn1.src
    tomcat7-7.0.90-1.33.amzn1.src

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2018-1055.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Infinite loop

EUVDB-ID: #VU13986

Risk: Medium

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1336

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to improper handing of overflow in the UTF-8 decoder with supplementary characters. A remote attacker can send trigger an infinite loop in the decoder and cause the service to crash.

Mitigation

Update the affected packages.

noarch:
    tomcat80-lib-8.0.53-1.80.amzn1.noarch
    tomcat80-8.0.53-1.80.amzn1.noarch
    tomcat80-servlet-3.1-api-8.0.53-1.80.amzn1.noarch
    tomcat80-el-3.0-api-8.0.53-1.80.amzn1.noarch
    tomcat80-docs-webapp-8.0.53-1.80.amzn1.noarch
    tomcat80-log4j-8.0.53-1.80.amzn1.noarch
    tomcat80-webapps-8.0.53-1.80.amzn1.noarch
    tomcat80-jsp-2.3-api-8.0.53-1.80.amzn1.noarch
    tomcat80-admin-webapps-8.0.53-1.80.amzn1.noarch
    tomcat80-javadoc-8.0.53-1.80.amzn1.noarch
    tomcat7-el-2.2-api-7.0.90-1.33.amzn1.noarch
    tomcat7-log4j-7.0.90-1.33.amzn1.noarch
    tomcat7-7.0.90-1.33.amzn1.noarch
    tomcat7-javadoc-7.0.90-1.33.amzn1.noarch
    tomcat7-docs-webapp-7.0.90-1.33.amzn1.noarch
    tomcat7-servlet-3.0-api-7.0.90-1.33.amzn1.noarch
    tomcat7-admin-webapps-7.0.90-1.33.amzn1.noarch
    tomcat7-lib-7.0.90-1.33.amzn1.noarch
    tomcat7-jsp-2.2-api-7.0.90-1.33.amzn1.noarch
    tomcat7-webapps-7.0.90-1.33.amzn1.noarch

src:
    tomcat80-8.0.53-1.80.amzn1.src
    tomcat7-7.0.90-1.33.amzn1.src

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2018-1055.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Information disclosure

EUVDB-ID: #VU12798

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-8014

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to the defaults settings for the CORS filter are insecure and enable supportsCredentials for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. A remote attacker can access important data.

Mitigation

Update the affected packages.

noarch:
    tomcat80-lib-8.0.53-1.80.amzn1.noarch
    tomcat80-8.0.53-1.80.amzn1.noarch
    tomcat80-servlet-3.1-api-8.0.53-1.80.amzn1.noarch
    tomcat80-el-3.0-api-8.0.53-1.80.amzn1.noarch
    tomcat80-docs-webapp-8.0.53-1.80.amzn1.noarch
    tomcat80-log4j-8.0.53-1.80.amzn1.noarch
    tomcat80-webapps-8.0.53-1.80.amzn1.noarch
    tomcat80-jsp-2.3-api-8.0.53-1.80.amzn1.noarch
    tomcat80-admin-webapps-8.0.53-1.80.amzn1.noarch
    tomcat80-javadoc-8.0.53-1.80.amzn1.noarch
    tomcat7-el-2.2-api-7.0.90-1.33.amzn1.noarch
    tomcat7-log4j-7.0.90-1.33.amzn1.noarch
    tomcat7-7.0.90-1.33.amzn1.noarch
    tomcat7-javadoc-7.0.90-1.33.amzn1.noarch
    tomcat7-docs-webapp-7.0.90-1.33.amzn1.noarch
    tomcat7-servlet-3.0-api-7.0.90-1.33.amzn1.noarch
    tomcat7-admin-webapps-7.0.90-1.33.amzn1.noarch
    tomcat7-lib-7.0.90-1.33.amzn1.noarch
    tomcat7-jsp-2.2-api-7.0.90-1.33.amzn1.noarch
    tomcat7-webapps-7.0.90-1.33.amzn1.noarch

src:
    tomcat80-8.0.53-1.80.amzn1.src
    tomcat7-7.0.90-1.33.amzn1.src

Vulnerable software versions

Amazon Linux AMI: All versions

External links

http://alas.aws.amazon.com/ALAS-2018-1055.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###