Description: | Description:
The remote host is missing updates announced in advisory RHSA-2007:0871.
Tomcat is a servlet container for Java Servlet and Java Server Pages technologies.
Tomcat was found treating single quote characters -- ' -- as delimiters in cookies. This could allow remote attackers to obtain sensitive information, such as session IDs, for session hijacking attacks (CVE-2007-3382).
It was reported Tomcat did not properly handle the following character sequence in a cookie: \ (a backslash followed by a double-quote). It was possible remote attackers could use this failure to obtain sensitive information, such as session IDs, for session hijacking attacks (CVE-2007-3385).
A cross-site scripting (XSS) vulnerability existed in the Host Manager Servlet. This allowed remote attackers to inject arbitrary HTML and web script via crafted requests (CVE-2007-3386).
Users of Tomcat should update to these erratum packages, which contain backported patches and are not vulnerable to these issues.
Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date
http://rhn.redhat.com/errata/RHSA-2007-0871.html http://tomcat.apache.org/security-5.html http://www.redhat.com/security/updates/classification/#moderate
Risk factor : Medium
CVSS Score: 4.3
|