Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2017-3081

Опубликовано: 30 окт. 2017
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2017-3081: tomcat security update (IMPORTANT)

[0:7.0.76-3]

  • Resolves: rhbz#1498344 CVE-2017-12615 CVE-2017-12617 tomcat: various flaws
  • Resolves: rhbz#1495654 CVE-2017-7674 tomcat: Vary header not added by CORS filter leading to cache poisoning
  • Resolves: rhbz#1470596 CVE-2017-5647 Add follow up revision

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

tomcat

7.0.76-3.el7_4

tomcat-admin-webapps

7.0.76-3.el7_4

tomcat-docs-webapp

7.0.76-3.el7_4

tomcat-el-2.2-api

7.0.76-3.el7_4

tomcat-javadoc

7.0.76-3.el7_4

tomcat-jsp-2.2-api

7.0.76-3.el7_4

tomcat-jsvc

7.0.76-3.el7_4

tomcat-lib

7.0.76-3.el7_4

tomcat-servlet-3.0-api

7.0.76-3.el7_4

tomcat-webapps

7.0.76-3.el7_4

Oracle Linux x86_64

tomcat

7.0.76-3.el7_4

tomcat-admin-webapps

7.0.76-3.el7_4

tomcat-docs-webapp

7.0.76-3.el7_4

tomcat-el-2.2-api

7.0.76-3.el7_4

tomcat-javadoc

7.0.76-3.el7_4

tomcat-jsp-2.2-api

7.0.76-3.el7_4

tomcat-jsvc

7.0.76-3.el7_4

tomcat-lib

7.0.76-3.el7_4

tomcat-servlet-3.0-api

7.0.76-3.el7_4

tomcat-webapps

7.0.76-3.el7_4

Связанные уязвимости

oracle-oval
больше 7 лет назад

ELSA-2017-3080: tomcat6 security update (IMPORTANT)

suse-cvrf
больше 7 лет назад

Security update for tomcat

CVSS3: 8.1
ubuntu
почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
redhat
почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
nvd
почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.