CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
72.2%
Package : tomcat7
Version : 7.0.28-4+deb7u12
CVE ID : CVE-2017-5647 CVE-2017-5648
Debian Bug : 860068
Two security vulnerabilities have been discovered in the Tomcat
servlet and JSP engine.
CVE-2017-5647
A bug in the handling of the pipelined requests when send file was
used resulted in the pipelined request being lost when send file
processing of the previous request completed. This could result in
responses appearing to be sent for the wrong request.
CVE-2017-5648
It was noticed that some calls to application listeners did not use
the appropriate facade object. When running an untrusted application
under a SecurityManager, it was therefore possible for that
untrusted application to retain a reference to the request or
response object and thereby access and/or modify information
associated with another web application.
For Debian 7 "Wheezy", these problems have been fixed in version
7.0.28-4+deb7u12.
We recommend that you upgrade your tomcat7 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | all | tomcat7 | < 7.0.56-3+deb8u10 | tomcat7_7.0.56-3+deb8u10_all.deb |
Debian | 8 | all | tomcat7-common | < 7.0.56-3+deb8u10 | tomcat7-common_7.0.56-3+deb8u10_all.deb |
Debian | 8 | all | tomcat8 | < 8.0.14-1+deb8u9 | tomcat8_8.0.14-1+deb8u9_all.deb |
Debian | 8 | all | tomcat7-user | < 7.0.56-3+deb8u10 | tomcat7-user_7.0.56-3+deb8u10_all.deb |
Debian | 8 | all | tomcat7-docs | < 7.0.56-3+deb8u10 | tomcat7-docs_7.0.56-3+deb8u10_all.deb |
Debian | 8 | all | libservlet3.0-java | < 7.0.56-3+deb8u10 | libservlet3.0-java_7.0.56-3+deb8u10_all.deb |
Debian | 8 | all | tomcat7-admin | < 7.0.56-3+deb8u10 | tomcat7-admin_7.0.56-3+deb8u10_all.deb |
Debian | 8 | all | tomcat7-examples | < 7.0.56-3+deb8u10 | tomcat7-examples_7.0.56-3+deb8u10_all.deb |
Debian | 8 | all | libservlet3.0-java-doc | < 7.0.56-3+deb8u10 | libservlet3.0-java-doc_7.0.56-3+deb8u10_all.deb |
Debian | 8 | all | libtomcat7-java | < 7.0.56-3+deb8u10 | libtomcat7-java_7.0.56-3+deb8u10_all.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
72.2%