7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 High
AI Score
Confidence
Low
0.791 High
EPSS
Percentile
98.3%
Debian Security Advisory DSA-4596-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
December 27, 2019 https://www.debian.org/security/faq
Package : tomcat8
CVE ID : CVE-2018-8014 CVE-2018-11784 CVE-2019-0199 CVE-2019-0221
CVE-2019-12418 CVE-2019-17563
Several issues were discovered in the Tomcat servlet and JSP engine, which
could result in session fixation attacks, information disclosure, cross-
site scripting, denial of service via resource exhaustion and insecure
redirects.
For the oldstable distribution (stretch), these problems have been fixed
in version 8.5.50-0+deb9u1. This update also requires an updated version
of tomcat-native which has been updated to 1.2.21-1~deb9u1.
We recommend that you upgrade your tomcat8 packages.
For the detailed security status of tomcat8 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/tomcat8
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | libservlet3.1-java-doc | < 8.5.50-0+deb9u1 | libservlet3.1-java-doc_8.5.50-0+deb9u1_all.deb |
Debian | 9 | all | libtomcat8-java | < 8.5.50-0+deb9u1 | libtomcat8-java_8.5.50-0+deb9u1_all.deb |
Debian | 9 | all | tomcat8-user | < 8.5.50-0+deb9u1 | tomcat8-user_8.5.50-0+deb9u1_all.deb |
Debian | 9 | all | tomcat8-admin | < 8.5.50-0+deb9u1 | tomcat8-admin_8.5.50-0+deb9u1_all.deb |
Debian | 9 | all | tomcat8-common | < 8.5.50-0+deb9u1 | tomcat8-common_8.5.50-0+deb9u1_all.deb |
Debian | 8 | all | tomcat7-user | < 7.0.56-3+really7.0.94-1 | tomcat7-user_7.0.56-3+really7.0.94-1_all.deb |
Debian | 8 | all | tomcat8-user | < 8.0.14-1+deb8u15 | tomcat8-user_8.0.14-1+deb8u15_all.deb |
Debian | 8 | all | tomcat7-examples | < 7.0.56-3+really7.0.94-1 | tomcat7-examples_7.0.56-3+really7.0.94-1_all.deb |
Debian | 8 | all | libtomcat8-java | < 8.0.14-1+deb8u15 | libtomcat8-java_8.0.14-1+deb8u15_all.deb |
Debian | 9 | all | libtomcat8-embed-java | < 8.5.50-0+deb9u1 | libtomcat8-embed-java_8.5.50-0+deb9u1_all.deb |
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 High
AI Score
Confidence
Low
0.791 High
EPSS
Percentile
98.3%