Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-1976

Опубликовано: 28 мая 2013
Источник: redhat
CVSS2: 6.9
EPSS Низкий

Описание

The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.

Отчет

This flaw pertains to the init scripts provided by the RPM distribution of tomcat in various Red Hat products. ZIP distributions do not include init scripts, and are not affected by this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Web Server 1othersNot affected
Red Hat Enterprise Linux 5tomcat5FixedRHSA-2013:087028.05.2013
Red Hat Enterprise Linux 6tomcat6FixedRHSA-2013:086928.05.2013
Red Hat JBoss Enterprise Web Server 1 for RHEL 5tomcat5FixedRHSA-2013:087228.05.2013
Red Hat JBoss Enterprise Web Server 1 for RHEL 5tomcat6FixedRHSA-2013:087228.05.2013
Red Hat JBoss Enterprise Web Server 1 for RHEL 6tomcat5FixedRHSA-2013:087228.05.2013
Red Hat JBoss Enterprise Web Server 1 for RHEL 6tomcat6FixedRHSA-2013:087228.05.2013
Red Hat JBoss Enterprise Web Server 2 for RHEL 5tomcat6FixedRHSA-2013:087128.05.2013
Red Hat JBoss Enterprise Web Server 2 for RHEL 5tomcat7FixedRHSA-2013:087128.05.2013
Red Hat JBoss Enterprise Web Server 2 for RHEL 6tomcat6FixedRHSA-2013:087128.05.2013

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=927622tomcat: Improper TOMCAT_LOG management in init script (DoS, ACE)

EPSS

Процентиль: 8%
0.00033
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

ubuntu
около 12 лет назад

The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.

nvd
около 12 лет назад

The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.

debian
около 12 лет назад

The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in ...

github
больше 3 лет назад

The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.

oracle-oval
около 12 лет назад

ELSA-2013-0870: tomcat5 security update (IMPORTANT)

EPSS

Процентиль: 8%
0.00033
Низкий

6.9 Medium

CVSS2