Amazon Linux AMI : tomcat6 (ALAS-2011-25)

high Nessus Plugin ID 69584

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.

Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file.

Solution

Run 'yum update tomcat6' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2011-25.html

Plugin Details

Severity: High

ID: 69584

File Name: ala_ALAS-2011-25.nasl

Version: 1.6

Type: local

Agent: unix

Published: 9/4/2013

Updated: 4/18/2018

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:tomcat6-jsp-2.1-api, p-cpe:/a:amazon:linux:tomcat6-webapps, p-cpe:/a:amazon:linux:tomcat6-docs-webapp, p-cpe:/a:amazon:linux:tomcat6-el-2.1-api, p-cpe:/a:amazon:linux:tomcat6-lib, p-cpe:/a:amazon:linux:tomcat6-admin-webapps, p-cpe:/a:amazon:linux:tomcat6, cpe:/o:amazon:linux, p-cpe:/a:amazon:linux:tomcat6-javadoc, p-cpe:/a:amazon:linux:tomcat6-servlet-2.5-api

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 12/2/2011

Reference Information

CVE: CVE-2011-1184, CVE-2011-2204, CVE-2011-3190

ALAS: 2011-25