Apache Tomcat 6.0.x < 6.0.40 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 8934

Synopsis

The remote Apache Tomcat server is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the instance of Apache Tomcat 6.0.x listening on the remote host is prior to 6.0.40. It is, therefore, affected by the following vulnerabilities:

- An error exists related to chunk size and chunked requests that allows denial of service attacks. (CVE-2014-0075)

- An error exists related to XSLT handling and security managers that allows a security bypass related to external XML entities. (CVE-2014-0096)

- An error exists related to content length header handling and using the application behind a reverse proxy that allows a security bypass. (CVE-2014-0099)

- An error exists that allows undesired XML parsers to be injected into the application by a malicious web application, allows the bypassing of security controls, and allows the processing of external XML entities. (CVE-2014-0119)

Note that Nessus Network Monitor has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Apache Tomcat version 6.0.41 or later.\n\nNote that while version 6.0.40 fixes these issues, that version was not officially released, and the vendor recommends upgrading to 6.0.41 or later.

See Also

http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.41

Plugin Details

Severity: Medium

ID: 8934

Family: Web Servers

Published: 3/2/2015

Updated: 5/20/2019

Nessus ID: 74245

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Patch Publication Date: 5/23/2014

Vulnerability Publication Date: 5/17/2014

Reference Information

CVE: CVE-2014-0075

BID: 67667