Multiple vulnerabilities in Tomcat may lead to local file overwriting,
session hijacking or information disclosure.
||www-servers/tomcat on all architectures
||revision >= 5.5.26, >= 6.0.16, revision >= 5.5.27
Tomcat is the Apache Jakarta Project's official implementation of Java
Servlets and Java Server Pages.
The following vulnerabilities were reported:
- Delian Krustev discovered that the JULI logging component does not
properly enforce access restrictions, allowing web application to add
or overwrite files (CVE-2007-5342).
When the native APR connector is used, Tomcat does not properly handle
an empty request to the SSL port, which allows remote attackers to
trigger handling of a duplicate copy of one of the recent requests
If the processing or parameters is interrupted, i.e. by an exception,
then it is possible for the parameters to be processed as part of later
An absolute path traversal vulnerability exists due to the way that
WebDAV write requests are handled (CVE-2007-5461).
Tomcat does not properly handle double quote (") characters or %5C
(encoded backslash) sequences in a cookie value, which might cause
sensitive information such as session IDs to be leaked to remote
attackers and enable session hijacking attacks
These vulnerabilities can be exploited by:
a malicious web application to add or overwrite files with the
permissions of the user running Tomcat.
a remote attacker to conduct session hijacking or disclose sensitive
There is no known workaround at this time.
All Tomcat 5.5.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/tomcat-5.5.26"
All Tomcat 6.0.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/tomcat-6.0.16"
April 10, 2008
May 28, 2009: 02