Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2007.0532 -- [RedHat] Moderate: tomcat security update 18 July 2007 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Tomcat Publisher: Red Hat Operating System: Red Hat Enterprise Linux 5 Impact: Cross-site Scripting Access: Remote/Unauthenticated CVE Names: CVE-2007-2450 CVE-2007-2449 Ref: ESB-2007.0423 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2007-0569.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: tomcat security update Advisory ID: RHSA-2007:0569-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0569.html Issue date: 2007-07-17 Updated on: 2007-07-17 Product: Red Hat Enterprise Linux CVE Names: CVE-2007-2449 CVE-2007-2450 - - --------------------------------------------------------------------- 1. Summary: Updated tomcat packages that fix two security issues and a packaging bug are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Problem description: Tomcat is a servlet container for Java Servlet and JavaServer Pages (JSP) technologies. Some JSPs within the 'examples' web application did not escape user provided data. If the JSP examples were accessible, this flaw could allow a remote attacker to perform cross-site scripting attacks (CVE-2007-2449). Note: it is recommended the 'examples' web application not be installed on a production system. The Manager and Host Manager web applications did not escape user provided data. If a user is logged in to the Manager or Host Manager web application, an attacker could perform a cross-site scripting attack (CVE-2007-2450). Users of Tomcat should update to these erratum packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bug IDs fixed (http://bugzilla.redhat.com/): 244804 - CVE-2007-2449 tomcat examples jsp XSS 244808 - CVE-2007-2450 tomcat host manager XSS 244846 - /var/tmp/rpm-tmp.25596: line 5: /usr/bin/rebuild-gcj-db: No such file or directory 6. RPMs required: Red Hat Enterprise Linux Desktop (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tomcat5-5.5.23-0jpp.1.0.4.el5.src.rpm 15852dbd79c1d28ddc2a607b8c2cced6 tomcat5-5.5.23-0jpp.1.0.4.el5.src.rpm i386: e04e3a9648ee9f94f38bd76951d23fb7 tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.i386.rpm 3100ed0342502126a609c5c15e78c764 tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.i386.rpm 47ffd27d607f4755b5da7fa1a65c5c48 tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.i386.rpm x86_64: 0f3219dedf2d15538133cb8a13310b8b tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.x86_64.rpm cbfcdf5f827921a71fda67293f3e44a7 tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.x86_64.rpm c25daaf3feb30744afc65c08a359635b tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.x86_64.rpm RHEL Desktop Workstation (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tomcat5-5.5.23-0jpp.1.0.4.el5.src.rpm 15852dbd79c1d28ddc2a607b8c2cced6 tomcat5-5.5.23-0jpp.1.0.4.el5.src.rpm i386: afa9a78630f8858f46db1434ad45fa7b tomcat5-5.5.23-0jpp.1.0.4.el5.i386.rpm 8c0ecbce40287f71f530360b0a769361 tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.i386.rpm 7f2628a9557c146febed5442c522a6e0 tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.i386.rpm e04e3a9648ee9f94f38bd76951d23fb7 tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.i386.rpm bc130f7c90ee690dc860712461ab9f82 tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.i386.rpm b653cc7d8aae4bb246079a9a9ce950d8 tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.i386.rpm 80429d018c31e87244213a9762ad10d3 tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.i386.rpm 3e564a9d6f0abf8f74ac5fe00cc3de25 tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.i386.rpm b8f6d1c37c68d463fbdee1426352618d tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.i386.rpm 7b4b8e5a891d09005bc8a1d2e1194d99 tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.i386.rpm x86_64: 1db5f282b62d759beda12cf35f83734f tomcat5-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 74544541ba072e94b9970b5919db3892 tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 3694bc19303c73cd46e75ca23d1051a4 tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 0f3219dedf2d15538133cb8a13310b8b tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 901f900e947eb38b8d17ef31238523cc tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 6835af3f3c0b9aa0deddac7e67ed79e0 tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.x86_64.rpm c4df3c21719e1cf5d38c19491651aa7e tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 0d5f131c789ca95f59d0886939aa8fe7 tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 66c20908529976c99cbf6bb41eecfbee tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 672951c48aacff47f1124c896445b887 tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/tomcat5-5.5.23-0jpp.1.0.4.el5.src.rpm 15852dbd79c1d28ddc2a607b8c2cced6 tomcat5-5.5.23-0jpp.1.0.4.el5.src.rpm i386: afa9a78630f8858f46db1434ad45fa7b tomcat5-5.5.23-0jpp.1.0.4.el5.i386.rpm 8c0ecbce40287f71f530360b0a769361 tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.i386.rpm 7f2628a9557c146febed5442c522a6e0 tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.i386.rpm e04e3a9648ee9f94f38bd76951d23fb7 tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.i386.rpm bc130f7c90ee690dc860712461ab9f82 tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.i386.rpm b653cc7d8aae4bb246079a9a9ce950d8 tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.i386.rpm 3100ed0342502126a609c5c15e78c764 tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.i386.rpm 80429d018c31e87244213a9762ad10d3 tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.i386.rpm 3e564a9d6f0abf8f74ac5fe00cc3de25 tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.i386.rpm 47ffd27d607f4755b5da7fa1a65c5c48 tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.i386.rpm b8f6d1c37c68d463fbdee1426352618d tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.i386.rpm 7b4b8e5a891d09005bc8a1d2e1194d99 tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.i386.rpm ia64: 1fbb19614a5c9a5d72c120e29b5094d3 tomcat5-5.5.23-0jpp.1.0.4.el5.ia64.rpm 77b1bf61e1ccb7e2af21d93105951997 tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.ia64.rpm e1b01f270313d22a6b957c4336352bd6 tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.ia64.rpm be47ede5989fbd0dc4398d839efd142c tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.ia64.rpm e1d93c56b0d3730914fe90694e7db9cd tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.ia64.rpm 9205bc162daa17e9f6314ed14e1f31bb tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.ia64.rpm 55ae893c5887213a4cc85cff3f482ec3 tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.ia64.rpm cf286fcf847a5325c0b3d2c8c1ff1c58 tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.ia64.rpm b404c9faa4503e4fe41d1fe8b3a4a721 tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.ia64.rpm d697720c77f93baaada1540e35913198 tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.ia64.rpm 56e8a796da04decd34bee5ba8616c284 tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.ia64.rpm fd8352214a62573bd2456c252f8fc186 tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.ia64.rpm ppc: f8625d3b5ef073ac8de77b1bdf9f01a4 tomcat5-5.5.23-0jpp.1.0.4.el5.ppc.rpm d7804d9e2ee85e8adaadc3695f9a1fcf tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.ppc.rpm 861f24537832282f47248a4d494eaad5 tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.ppc.rpm 0dbaa701244414a6babde13da3698129 tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.ppc.rpm 36cee8546f804c0ea91fad586d9db6cd tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.ppc.rpm e84767196956742319016c08fc59f4b9 tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.ppc.rpm 05085799e57547f7b95370cf93097ad1 tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.ppc.rpm a9ff8fe3c28adfacc923accc2e02238f tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.ppc.rpm a32d42fb280bb96daa06abd576a315a2 tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.ppc.rpm 37746d0e7931671779fbad9b61877703 tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.ppc.rpm d91221a346ce66fa021701440b6bc429 tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.ppc.rpm 2d1ab7c457ae33a9fe00f13c6a0f8b6a tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.ppc.rpm s390x: 3d86afce9e1b0a269701b5b2225d0ebb tomcat5-5.5.23-0jpp.1.0.4.el5.s390x.rpm 36b7b3706abeda4f31fdce022e6f266d tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.s390x.rpm deabcb46f038caa0aff7f173e2430db7 tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.s390x.rpm f67b472f1d874f64f287a407f3c8e608 tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.s390x.rpm 3e2c4780d83adf2ec2f75dabeeebc573 tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.s390x.rpm 8e0ecac842e2079335a0a12a588b6cbc tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.s390x.rpm 3389c6531f4ab0df5644f9a75890f798 tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.s390x.rpm fb0e8d1800a1154fdf9685e657471db5 tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.s390x.rpm 0a7e68052ce02e1f12561c4ba81804b9 tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.s390x.rpm 36d5b39eab1d8319e35672856ce73732 tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.s390x.rpm a5b178ad39e13481070be36675b936f0 tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.s390x.rpm b76e10eb457da5b811e8b340400e872b tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.s390x.rpm x86_64: 1db5f282b62d759beda12cf35f83734f tomcat5-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 74544541ba072e94b9970b5919db3892 tomcat5-admin-webapps-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 3694bc19303c73cd46e75ca23d1051a4 tomcat5-common-lib-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 0f3219dedf2d15538133cb8a13310b8b tomcat5-debuginfo-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 901f900e947eb38b8d17ef31238523cc tomcat5-jasper-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 6835af3f3c0b9aa0deddac7e67ed79e0 tomcat5-jasper-javadoc-5.5.23-0jpp.1.0.4.el5.x86_64.rpm cbfcdf5f827921a71fda67293f3e44a7 tomcat5-jsp-2.0-api-5.5.23-0jpp.1.0.4.el5.x86_64.rpm c4df3c21719e1cf5d38c19491651aa7e tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 0d5f131c789ca95f59d0886939aa8fe7 tomcat5-server-lib-5.5.23-0jpp.1.0.4.el5.x86_64.rpm c25daaf3feb30744afc65c08a359635b tomcat5-servlet-2.4-api-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 66c20908529976c99cbf6bb41eecfbee tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.1.0.4.el5.x86_64.rpm 672951c48aacff47f1124c896445b887 tomcat5-webapps-5.5.23-0jpp.1.0.4.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450 http://tomcat.apache.org/security-5.html http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2007 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFGnJvQXlSAg2UNWIIRAvWNAKCAmMjPvRMQQAn2bY8ZsznT/MNYCwCeOGkt Yj7fPKtDEzYnYsW4hs49H5A= =UBUR - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRp1Etyh9+71yA2DNAQLGtwP+Oa45zhuWra9gzf8m0OOb8mshQpUK8kZ9 xSug/j2F0JlYKHkvJPhhdz55AlPnXvr2SH0C//F7hOx+Z7c8uzI9/IYXQcQrrork 0nKf5hDBupxlHLJXsqFgCoWmDrbt5s65ylR9eJmhVjroCAt1bf7bRPxgG7mrQ74Y GxJZLp42gDQ= =aQCI -----END PGP SIGNATURE-----