USN-1685-1: Tomcat vulnerabilities

14 January 2013

Several security issues were fixed in Tomcat.

Releases

Packages

  • tomcat6 - Servlet and JSP engine
  • tomcat7 - Servlet and JSP engine

Details

It was discovered that Tomcat incorrectly performed certain security
constraint checks in the FORM authenticator. A remote attacker could
possibly use this flaw with a specially-crafted URI to bypass security
constraint checks. This issue only affected Ubuntu 10.04 LTS, Ubuntu 11.10
and Ubuntu 12.04 LTS. (CVE-2012-3546)

It was discovered that Tomcat incorrectly handled requests that lack a
session identifier. A remote attacker could possibly use this flaw to
bypass the cross-site request forgery protection. (CVE-2012-4431)

It was discovered that Tomcat incorrectly handled sendfile and HTTPS when
the NIO connector is used. A remote attacker could use this flaw to cause
Tomcat to stop responsing, resulting in a denial of service. This issue
only affected Ubuntu 10.04 LTS, Ubuntu 11.10 and Ubuntu 12.04 LTS.
(CVE-2012-4534)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.10
Ubuntu 12.04
Ubuntu 11.10
Ubuntu 10.04

In general, a standard system update will make all the necessary changes.