GLSA: tomcat

From: Daniel Ahlberg (alizat_private)
Date: Tue Oct 15 2002 - 01:14:43 PDT

  • Next message: Jitsu-Disk: "securitybugware new network tool"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200210-001
    - - --------------------------------------------------------------------
    
    PACKAGE : tomcat
    SUMMARY : source disclosure
    EXPLOIT : remote
    DATE    : 2002-10-15 08:15 UTC
    
    - - --------------------------------------------------------------------
    
    A security vulnerability has been confirmed to exist in Apache Tomcat
    4.0.x releases (including Tomcat 4.0.5), which allows to use a specially
    crafted URL to return the unprocessed source of a JSP page, or, under
    special circumstances, a static resource which would otherwise have been
    protected by security constraint, without the need for being properly
    authenticated. This is based on a variant of the exploit that was
    disclosed on 09/24/2002.
    
    Read the full disclosure at
    http://marc.theaimsgroup.com/?l=tomcat-dev&m=103417249325526&w=2
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-www/tomcat-4.0.5 and earlier update their systems
    as follows:
    
    emerge rsync
    emerge tomcat
    emerge clean
    
    - - --------------------------------------------------------------------
    alizat_private - GnuPG key is available at www.gentoo.org/~aliz
    - - --------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)
    
    iD8DBQE9q85zfT7nyhUpoZMRAripAKC2pwD2g82Np0cal/0afanM4mfVCgCfbx9o
    dNLvNJOnmcq3QcvT/S4D3wQ=
    =6MID
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Tue Oct 15 2002 - 11:29:49 PDT