Lucene search

K
openvasCopyright (C) 2012 Greenbone AGOPENVAS:1361412562310870626
HistoryJun 06, 2012 - 12:00 a.m.

RedHat Update for tomcat6 RHSA-2011:0791-01

2012-06-0600:00:00
Copyright (C) 2012 Greenbone AG
plugins.openvas.org
16

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6

Confidence

High

EPSS

0.013

Percentile

85.9%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2011-May/msg00026.html");
  script_oid("1.3.6.1.4.1.25623.1.0.870626");
  script_version("2024-03-21T05:06:54+0000");
  script_tag(name:"last_modification", value:"2024-03-21 05:06:54 +0000 (Thu, 21 Mar 2024)");
  script_tag(name:"creation_date", value:"2012-06-06 10:35:19 +0530 (Wed, 06 Jun 2012)");
  script_cve_id("CVE-2010-3718", "CVE-2010-4172", "CVE-2011-0013");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_xref(name:"RHSA", value:"2011:0791-01");
  script_name("RedHat Update for tomcat6 RHSA-2011:0791-01");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'tomcat6'
  package(s) announced via the referenced advisory.");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2012 Greenbone AG");
  script_family("Red Hat Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_6");
  script_tag(name:"affected", value:"tomcat6 on Red Hat Enterprise Linux Server (v. 6),
  Red Hat Enterprise Linux Workstation (v. 6)");
  script_tag(name:"solution", value:"Please Install the Updated Packages.");
  script_tag(name:"insight", value:"Apache Tomcat is a servlet container for the Java Servlet and JavaServer
  Pages (JSP) technologies.

  It was found that web applications could modify the location of the Tomcat
  host's work directory. As web applications deployed on Tomcat have read and
  write access to this directory, a malicious web application could use this
  flaw to trick Tomcat into giving it read and write access to an arbitrary
  directory on the file system. (CVE-2010-3718)

  A cross-site scripting (XSS) flaw was found in the Manager application,
  used for managing web applications on Tomcat. If a remote attacker could
  trick a user who is logged into the Manager application into visiting a
  specially-crafted URL, the attacker could perform Manager application tasks
  with the privileges of the logged in user. (CVE-2010-4172)

  A second cross-site scripting (XSS) flaw was found in the Manager
  application. A malicious web application could use this flaw to conduct an
  XSS attack, leading to arbitrary web script execution with the privileges
  of victims who are logged into and viewing Manager application web pages.
  (CVE-2011-0013)

  This update also fixes the following bugs:

  * A bug in the 'tomcat6' init script prevented additional Tomcat instances
  from starting. As well, running 'service tomcat6 start' caused
  configuration options applied from '/etc/sysconfig/tomcat6' to be
  overwritten with those from '/etc/tomcat6/tomcat6.conf'. With this update,
  multiple instances of Tomcat run as expected. (BZ#636997)

  * The '/usr/share/java/' directory was missing a symbolic link to the
  '/usr/share/tomcat6/bin/tomcat-juli.jar' library. Because this library was
  mandatory for certain operations (such as running the Jasper JSP
  precompiler), the 'build-jar-repository' command was unable to compose a
  valid classpath. With this update, the missing symbolic link has been
  added. (BZ#661244)

  * Previously, the 'tomcat6' init script failed to start Tomcat with a 'This
  account is currently not available.' message when Tomcat was configured to
  run under a user that did not have a valid shell configured as a login
  shell. This update modifies the init script to work correctly regardless of
  the daemon user's login shell. Additionally, these new tomcat6 packages now
  set '/sbin/nologin' as the login shell for the 'tomcat' user upon
  installation, as recommended by deployment best practices. (BZ#678671 ...

  Description truncated, please see the referenced URL(s) for more information.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release) exit(0);

res = "";

if(release == "RHENT_6")
{

  if ((res = isrpmvuln(pkg:"tomcat6", rpm:"tomcat6~6.0.24~33.el6", rls:"RHENT_6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"tomcat6-el-2.1-api", rpm:"tomcat6-el-2.1-api~6.0.24~33.el6", rls:"RHENT_6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"tomcat6-jsp-2.1-api", rpm:"tomcat6-jsp-2.1-api~6.0.24~33.el6", rls:"RHENT_6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"tomcat6-lib", rpm:"tomcat6-lib~6.0.24~33.el6", rls:"RHENT_6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"tomcat6-servlet-2.5-api", rpm:"tomcat6-servlet-2.5-api~6.0.24~33.el6", rls:"RHENT_6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99);
  exit(0);
}

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6

Confidence

High

EPSS

0.013

Percentile

85.9%