Lucene search

K
ubuntucveUbuntu.comUB:CVE-2016-0714
HistoryFeb 24, 2016 - 12:00 a.m.

CVE-2016-0714

2016-02-2400:00:00
ubuntu.com
ubuntu.com
13

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.008 Low

EPSS

Percentile

81.7%

The session-persistence implementation in Apache Tomcat 6.x before 6.0.45,
7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles
session attributes, which allows remote authenticated users to bypass
intended SecurityManager restrictions and execute arbitrary code in a
privileged context via a web application that places a crafted object in a
session.

Bugs

Notes

Author Note
mdeslaur list of backports is incomplete. Fix is intrusive.
OSVersionArchitecturePackageVersionFilename
ubuntu12.04noarchtomcat6< 6.0.35-1ubuntu3.7UNKNOWN
ubuntu14.04noarchtomcat6< 6.0.39-1ubuntu0.1UNKNOWN
ubuntu16.04noarchtomcat6< 6.0.45+dfsg-1UNKNOWN
ubuntu14.04noarchtomcat7< 7.0.52-1ubuntu0.6UNKNOWN
ubuntu15.10noarchtomcat7< 7.0.64-1ubuntu0.3UNKNOWN

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.008 Low

EPSS

Percentile

81.7%