#VU32077 Input validation error in Apache Tomcat


Published: 2017-04-11 | Updated: 2021-02-03

Vulnerability identifier: #VU32077

Vulnerability risk: Medium

CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-5969

CWE-ID: CWE-20

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Apache Tomcat
Server applications / Web servers

Vendor: Apache Foundation

Description

The vulnerability allows remote attackers to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference) via a crafted XML document.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Apache Tomcat: 6.0.19


External links
http://www.openwall.com/lists/oss-security/2016/11/05/3
http://www.openwall.com/lists/oss-security/2017/02/13/1
http://www.securityfocus.com/bid/96188
http://bugzilla.gnome.org/show_bug.cgi?id=778519
http://security.gentoo.org/glsa/201711-01


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability