CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
98.2%
Package : tomcat6
Version : 6.0.45+dfsg-1~deb7u3
CVE ID : CVE-2016-0762 CVE-2016-5018 CVE-2016-6794
CVE-2016-6796 CVE-2016-6797 CVE-2016-6816
CVE-2016-8735
Debian Bug : 841655 842662 842663 842664 842665 842666 845385
Multiple security vulnerabilities have been discovered in the Tomcat
servlet and JSP engine, which may result in possible timing attacks to
determine valid user names, bypass of the SecurityManager, disclosure of
system properties, unrestricted access to global resources, arbitrary
file overwrites, and potentially escalation of privileges.
In addition this update further hardens Tomcat's init and maintainer
scripts to prevent possible privilege escalations. Thanks to Paul
Szabo for the report.
This is probably the last security update of Tomcat 6 which will reach
its end-of-life exactly in one month. We strongly recommend to switch
to another supported version such as Tomcat 7 at your earliest
convenience.
For Debian 7 "Wheezy", these problems have been fixed in version
6.0.45+dfsg-1~deb7u3.
We recommend that you upgrade your tomcat6 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | all | libtomcat6-java | < 6.0.45+dfsg-1~deb7u3 | libtomcat6-java_6.0.45+dfsg-1~deb7u3_all.deb |
Debian | 7 | all | tomcat6 | < 6.0.45+dfsg-1~deb7u3 | tomcat6_6.0.45+dfsg-1~deb7u3_all.deb |
Debian | 7 | all | tomcat6-user | < 6.0.45+dfsg-1~deb7u3 | tomcat6-user_6.0.45+dfsg-1~deb7u3_all.deb |
Debian | 8 | all | tomcat8-examples | < 8.0.14-1+deb8u4 | tomcat8-examples_8.0.14-1+deb8u4_all.deb |
Debian | 8 | all | tomcat7 | < 7.0.56-3+deb8u5 | tomcat7_7.0.56-3+deb8u5_all.deb |
Debian | 7 | all | tomcat7-common | < 7.0.28-4+deb7u7 | tomcat7-common_7.0.28-4+deb7u7_all.deb |
Debian | 8 | all | tomcat7-admin | < 7.0.56-3+deb8u5 | tomcat7-admin_7.0.56-3+deb8u5_all.deb |
Debian | 7 | all | tomcat6-docs | < 6.0.45+dfsg-1~deb7u3 | tomcat6-docs_6.0.45+dfsg-1~deb7u3_all.deb |
Debian | 7 | all | tomcat7-admin | < 7.0.28-4+deb7u7 | tomcat7-admin_7.0.28-4+deb7u7_all.deb |
Debian | 8 | all | tomcat8-common | < 8.0.14-1+deb8u4 | tomcat8-common_8.0.14-1+deb8u4_all.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
98.2%