int(4627)

Vulnerability Bulletins


Revelación de información privilegiada en Apache Tomcat

Vulnerability classification

Property Value
Confidence level Oficial
Impact Confidencialidad
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio estandar

System information

Property Value
Affected manufacturer GNU/Linux
Affected software JK Connector (mod_jk) < 1.2.6

Description

Se ha descubierto una vulnerabilidad en JK Connector en Apache Tomcat.

Un atacante remoto podría obtener información privilegiada mediante una petición que, en circunstancias concretas, incluye una cabecera "Content-Length" pero no datos POST.

Solution



Actualización de software

Red Hat (RHSA-2009:0446-1)
Red Hat Application Stack v2
https://rhn.redhat.com/

Debian (DSA-1810-1)

Debian Linux 4.0
Source
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2.dsc
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2.diff.gz
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18.orig.tar.gz
Arquitectura independiente:
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk-doc_1.2.18-3etch2_all.deb
alpha (DEC Alpha)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_alpha.deb
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_alpha.deb
amd64 (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_amd64.deb
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_amd64.deb
arm (ARM)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_arm.deb
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_arm.deb
hppa (HP PA RISC)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_hppa.deb
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_hppa.deb
i386 (Intel ia32)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_i386.deb
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_i386.deb
ia64 (Intel ia64)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_ia64.deb
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_ia64.deb
mips (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_mips.deb
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_mips.deb
mipsel (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_mipsel.deb
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_mipsel.deb
powerpc (PowerPC)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_powerpc.deb
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_powerpc.deb
s390 (IBM S/390)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_s390.deb
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_s390.deb
sparc (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_sparc.deb
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_sparc.deb

Debian (DSA-1810-1)

Debian Linux 5.0
Source
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.26-2+lenny1.dsc
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.26.orig.tar.gz
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.26-2+lenny1.diff.gz
Arquitectura independiente:
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk-doc_1.2.26-2+lenny1_all.deb
alpha (DEC Alpha)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_alpha.deb
amd64 (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_amd64.deb
arm (ARM)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_arm.deb
armel (ARM EABI)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_armel.deb
hppa (HP PA RISC)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_hppa.deb
i386 (Intel ia32)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_i386.deb
ia64 (Intel ia64)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_ia64.deb
mips (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_mips.deb
mipsel (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_mipsel.deb
powerpc (PowerPC)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_powerpc.deb
s390 (IBM S/390)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_s390.deb
sparc (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_sparc.deb

Red Hat (RHSA-2009:1087-1)
Application Server v2 EL4
https://rhn.redhat.com/

Sun (262468)
Solaris 9 / SPARC / patch 114016-04
Solaris 9 / x86 / patch 114017-04
Solaris 10 / SPARC / patch 122911-16
Solaris 10 / x86 / patch 122912-16
http://sunsolve.sun.com/pub-cgi/show.pl?target=patchpage

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux.

Standar resources

Property Value
CVE CVE-2008-5519
BID 34412

Other resources

Red Hat Security Advisory (RHSA-2009:0446-1)
https://rhn.redhat.com/errata/RHSA-2009-0446.html

Debian Security Advisory (DSA-1810-1)
http://lists.debian.org/debian-security-announce/2009/msg00122.html

Red Hat Security Advisory (RHSA-2009:1087-1)
https://rhn.redhat.com/errata/RHSA-2009-1087.html

Sun Alert Notification (262468)
http://sunsolve.sun.com/search/document.do?assetkey=1-66-262468-1

SUSE Security Advisory (SUSE-SR:2009:020)
http://www.novell.com/linux/security/advisories/2009_20_sr.html

Version history

Version Comments Date
1.0 Aviso emitido 2009-04-24
1.1 Aviso emitido por Debian (DSA-1810-1) 2009-06-03
1.2 Aviso emitido por Red Hat (RHSA-2009:1087-1) 2009-06-10
1.3 Aviso emitido por Sun (262468) 2009-07-03
1.4 Aviso emitido por Suse (SUSE-SR:2009:020) 2010-01-19
Ministerio de Defensa
CNI
CCN
CCN-CERT