tomcat6-6.0.24-72.AXS4
エラータID: AXSA:2014-451:03
Tomcat is the servlet container that is used in the official Reference
Implementation for the Java Servlet and JavaServer Pages technologies.
The Java Servlet and JavaServer Pages specifications are developed by
Sun under the Java Community Process.
Tomcat is developed in an open and participatory environment and
released under the Apache Software License version 2.0. Tomcat is intended
to be a collaboration of the best-of-breed developers from around the world.
Security issues fixed with this release:
CVE-2014-0075
Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.
CVE-2014-0096
java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
CVE-2014-0099
Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
fixed bugs:
* Previously, the CVE-2014-0050 issue contained redundant code, and remove the redundant code.
* Previously, the CVE-2013-4322 issue contained an invalid check that triggered a java.io.EOFException while reading trailer headers for chunked requests. This update fixes the check.
update packages.
Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.
java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
N/A
SRPMS
- tomcat6-6.0.24-72.AXS4.src.rpm
MD5: cded0927f44b22a72324d76dc4f3bcc1
SHA-256: 93e795366c4653a6bead6764a3ecff92028c19d340fd2ccffefdee9f9756a775
Size: 3.45 MB
Asianux Server 4 for x86
- tomcat6-6.0.24-72.AXS4.noarch.rpm
MD5: a4365373d59c89b8714a5e5ff2c9b368
SHA-256: 131d28a406adde9c13632292a05b03747bd360bac60aaf31b8d42df69fe03655
Size: 90.18 kB - tomcat6-el-2.1-api-6.0.24-72.AXS4.noarch.rpm
MD5: bfcddd149c9b3ab63c3910705fc214b1
SHA-256: b2ce6b7532b00d6465685cad058279feda2075f3ffbd08c6c2bf6b42dc807e28
Size: 46.00 kB - tomcat6-jsp-2.1-api-6.0.24-72.AXS4.noarch.rpm
MD5: 28e14704f1e6de0af729d36fe11bfd4a
SHA-256: 59c097bfdb2d1937b964214eee506fb1b7122c87fa9f35f413dcd580fa6ff947
Size: 82.90 kB - tomcat6-lib-6.0.24-72.AXS4.noarch.rpm
MD5: 09c0ab1e60f8e583ae49592d9650ab79
SHA-256: a5efcc82cded74b10d4804cd7ff5ea713e498b788b1a10f61f4346b1bd1104fd
Size: 2.89 MB - tomcat6-servlet-2.5-api-6.0.24-72.AXS4.noarch.rpm
MD5: c1cf8c27a7ba6e7b6dd97d58d4e3e9e3
SHA-256: f06e763c5b122c5ac933015071baded741970bd550cb1100adba87314d17b477
Size: 96.78 kB
Asianux Server 4 for x86_64
- tomcat6-6.0.24-72.AXS4.noarch.rpm
MD5: 2a17906a9fad32ffebce3b4c155ee46a
SHA-256: 2e5c13d69243fe0d65e2be6834617073b1a6067c8b976974d2a4e5695a5c755d
Size: 89.73 kB - tomcat6-el-2.1-api-6.0.24-72.AXS4.noarch.rpm
MD5: 753f1a874422b76d81076bd53d2d0ac6
SHA-256: c180ff1a9a66f3ec9f16e92aaef34132f617f8ab2e1150fd33dc031b931dd72e
Size: 45.55 kB - tomcat6-jsp-2.1-api-6.0.24-72.AXS4.noarch.rpm
MD5: ce62475514ef50d6002b53a930b807aa
SHA-256: 51d8e70e64e6f9ed90bdb1b627cef6d1336fe03090dbf67469823c74f817dff5
Size: 82.45 kB - tomcat6-lib-6.0.24-72.AXS4.noarch.rpm
MD5: 6aaeffd2b544e988c4eeead2d1986c6d
SHA-256: 86ba7dce9da8ae8434f49890b9fd134da11619fd3716a827867dedf0f0a9b815
Size: 2.89 MB - tomcat6-servlet-2.5-api-6.0.24-72.AXS4.noarch.rpm
MD5: f04e588b696362c87b65137821249061
SHA-256: 2af709d99efbff7d9167a16460313f9baae7c8feb72c54a3e5fcd513fe8a1a95
Size: 96.33 kB