tomcat6-6.0.24-52.AXS4

エラータID: AXSA:2013-279:02

Release date: 
Friday, March 29, 2013 - 12:37
Subject: 
tomcat6-6.0.24-52.AXS4
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process.

Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.

Security issues fixed with this release:

• CVE-2012-3546
org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.

• CVE-2012-4534
org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during the reading of a response.

• CVE-2012-5885
The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.

• CVE-2012-5886
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.

• CVE-2012-5887
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.

Fixed bugs:

• Due to a mistake in the spec file, Apache Tomcat initscripts were located in the /etc/init.d directory. They should be located in the /etc/rc.d/init.d directory. This has been fixed by updatign the spec file.

• When a web application used its own class loader, the Tomcat WebappClassLoader could end up in a deadlock when compiling JSPs because of a synchronization bug. This has been fixed.

• When changing the TOMCAT_USER in the /etc/tomcat6/tomcat6.conf file to a user whose UID differed from the user GID, the status returned an incorrect tomcat6 status. This has been fixed.

• Tomcat returned a message that the resource was not available when trying to import a non-existing page with JavaScript fragments in the URL parameters. Tomcat now supports HTML filtering and instead reports that the resource is missing.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. tomcat6-6.0.24-52.AXS4.src.rpm
    MD5: 0eb7393d09f70d8210fdddcbd76ad676
    SHA-256: 1a0b7f24c4facb9cb03dbcc59d73d468375159bfa32752e0425a4218fc62d323
    Size: 3.36 MB

Asianux Server 4 for x86
  1. tomcat6-6.0.24-52.AXS4.noarch.rpm
    MD5: f50e2dd79ed6d9a22e7e03103e27c88c
    SHA-256: 1a5347774129c4adcb32b1726c9e5f80a8f03438307ab080478660956397b8be
    Size: 87.91 kB
  2. tomcat6-el-2.1-api-6.0.24-52.AXS4.noarch.rpm
    MD5: 4f884299730c76e77f84fc39d1c3f9b1
    SHA-256: e55254db2d3e0c12a5952040db5feeb579274212714cff05d43e4a5a2727d036
    Size: 43.87 kB
  3. tomcat6-jsp-2.1-api-6.0.24-52.AXS4.noarch.rpm
    MD5: 88230f3a392b015c6e1fe1727c78689d
    SHA-256: 725c834da271e58e4127fbac5418a4d38215c5fb5a3f8c8d8f210347862a7b82
    Size: 80.77 kB
  4. tomcat6-lib-6.0.24-52.AXS4.noarch.rpm
    MD5: 18a70db4b383fc5dae99ea0039f30b60
    SHA-256: 95ce33c3aea93aa1c6d716d354ae184d1fc76e3ff5548b48256c9cab1aac4d35
    Size: 2.82 MB
  5. tomcat6-servlet-2.5-api-6.0.24-52.AXS4.noarch.rpm
    MD5: 0cc7899cc8734f2543bd4db698514ab7
    SHA-256: a19e39f5a88a40236a754e68265f6c0799a03b556e78b174f9998951aff858dc
    Size: 94.64 kB

Asianux Server 4 for x86_64
  1. tomcat6-6.0.24-52.AXS4.noarch.rpm
    MD5: 2f9c1146ab7e6dbd9aac5077dd5c2bbb
    SHA-256: 5bad361fa8f8c28dc9b06b6f5f03fae4a66f3508a01eac35de57effc742fa5ee
    Size: 87.51 kB
  2. tomcat6-el-2.1-api-6.0.24-52.AXS4.noarch.rpm
    MD5: 8d3796ddf51580628397910de730dd35
    SHA-256: eaca6f7a826030f3478e8a3e7b4aafe29c8799edd43f11faaa66b66cc9dccee1
    Size: 43.41 kB
  3. tomcat6-jsp-2.1-api-6.0.24-52.AXS4.noarch.rpm
    MD5: 4fccf47ca5158e32b22771f60fd5be10
    SHA-256: ee71bd4a3fa37d471e96f75477091ff660529e036b8ecd45fed4070cf2ca3dbe
    Size: 80.32 kB
  4. tomcat6-lib-6.0.24-52.AXS4.noarch.rpm
    MD5: 773af89b951f0a9174635595b760f407
    SHA-256: b7f6abccdbe0bcd88c5c21d2262ef42af854e96b1f9180ba20c54e18bc6227ff
    Size: 2.82 MB
  5. tomcat6-servlet-2.5-api-6.0.24-52.AXS4.noarch.rpm
    MD5: 44fa5b15225d648512ed60254698b6c6
    SHA-256: 5cd1c865424d29365f0a7789e23bdb80d70e8fb5a034869d08b036bb00879c06
    Size: 94.20 kB