Daily threat assessment 23FEB2016 (apache tomcat vulns)

Security annoucements of interest to the AtomiCorp community, such as vulnerabilities in third party applications.
User avatar
mikeshinn
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 4149
Joined: Thu Feb 07, 2008 7:49 pm
Location: Chantilly, VA

Daily threat assessment 23FEB2016 (apache tomcat vulns)

Unread post by mikeshinn »

This report is a daily analysis of all published vulnerabilities in any product, weaknesses in technologies, exploits Internet wide, current internet threats associated with platforms and products our customer use, and if any action is required to protect their assets from these these vulnerabilities, weaknesses and exploits depending on the Atomicorp product they are using.

Please see this forum post for an explanation of the categories used in this report.

CVEs are sometimes created after a vulnerability is published (sometimes far after it has been made public). When CVEs are referenced, it is because a CVE was created today, not because an issue was resolved today, and it is included here for reference.

ASL users

Summary: Apache tomcat users are recommended to upgrade tomcat.

Already protected against/Known Method/No update required

Prezi Cross Site Scripting
SamenBlog Weblog Service Cross Site Request Forgery / Cross Site Scripting
Novell Filr 1.2.0 Build 846 Cross Site Scripting

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

Numerous vulnerabilities exist in tomcat, too many to be sure that the issues are adequately protected against (and details are sparse in some cases). Therefore, tomcat users should upgrade:

Upgrade to Apache Tomcat 9.0.0.M3 or later
- - Upgrade to Apache Tomcat 8.0.32 or later
(8.0.31 has the fix but was not released)
- - Upgrade to Apache Tomcat 7.0.68 or later
- - Upgrade to Apache Tomcat 6.0.45 or later


Rules only users

Summary: Linux users that do not have the ASL secure kernel installed may be vulnerable to a kernel level exploit. See notes below.

Already protected against/Known Method/No update required

Prezi Cross Site Scripting
SamenBlog Weblog Service Cross Site Request Forgery / Cross Site Scripting
Novell Filr 1.2.0 Build 846 Cross Site Scripting


Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

Numerous vulnerabilities exist in tomcat, too many to be sure that the issue are adequately protected against (and details are sparse in some cases). Therefore, tomcat users should upgrade:

Upgrade to Apache Tomcat 9.0.0.M3 or later
- - Upgrade to Apache Tomcat 8.0.32 or later
(8.0.31 has the fix but was not released)
- - Upgrade to Apache Tomcat 7.0.68 or later
- - Upgrade to Apache Tomcat 6.0.45 or later
Post Reply