The Apache Tomcat team has announced 3 new security advisories for Apache Tomcat versions 6 and 7. All three of these advisories are classified as important, meaning that users should upgrade to an appropriate version of Tomcat. The advisories are:
CVE-2012-4534 Apache Tomcat denial of service
"When using the NIO connector with sendfile and HTTPS enabled, if a client breaks the connection while reading the response an infinite loop is entered leading to a denial of service."
Users are advised to upgrade to Tomcat version 7.0.28 or later (or 6.0.36 or later for Tomcat 6 users).
CVE-2012-3546 Apache Tomcat Bypass of security constraints
"When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending "/j_security_check" to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to FormAuthenticator#authenticate()."
Users are advised to upgrade to Tomcat version 7.0.30 or later (or 6.0.36 or later for Tomcat 6 users).
CVE-2012-4431 Apache Tomcat Bypass of CSRF prevention filter
"The CSRF prevention filter could be bypassed if a request was made to a protected resource without a session identifier present in the request."
Users are advised to upgrade to Tomcat version 7.0.32 or later (or 6.0.36 or later for Tomcat 6 users).
- CVE-2012-4534 Apache Tomcat denial of service
- CVE-2012-3546 Apache Tomcat Bypass of security constraints
- CVE-2012-4431 Apache Tomcat Bypass of CSRF prevention filter
CVE-2012-4534 Apache Tomcat denial of service
"When using the NIO connector with sendfile and HTTPS enabled, if a client breaks the connection while reading the response an infinite loop is entered leading to a denial of service."
Users are advised to upgrade to Tomcat version 7.0.28 or later (or 6.0.36 or later for Tomcat 6 users).
CVE-2012-3546 Apache Tomcat Bypass of security constraints
"When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending "/j_security_check" to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to FormAuthenticator#authenticate()."
Users are advised to upgrade to Tomcat version 7.0.30 or later (or 6.0.36 or later for Tomcat 6 users).
CVE-2012-4431 Apache Tomcat Bypass of CSRF prevention filter
"The CSRF prevention filter could be bypassed if a request was made to a protected resource without a session identifier present in the request."
Users are advised to upgrade to Tomcat version 7.0.32 or later (or 6.0.36 or later for Tomcat 6 users).
Comments
Post a Comment