Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-0186
Vulnerability from cvelistv5
Published
2014-06-14 10:00
Modified
2024-08-06 09:05
Severity ?
EPSS score ?
Summary
A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:39.246Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2014:0686", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2014-0686.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1089884" }, { "name": "108060", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/108060" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2014-0186" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-06-14T04:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2014:0686", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2014-0686.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1089884" }, { "name": "108060", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/108060" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2014-0186" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0186", "datePublished": "2014-06-14T10:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:39.246Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-0186\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-06-14T11:18:54.207\",\"lastModified\":\"2024-11-21T02:01:35.370\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression.\"},{\"lang\":\"es\",\"value\":\"Cierto paquete tomcat7 para Apache Tomcat 7 en Red Hat Enterprise Linux (RHEL) 7 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de una solicitud manipulada. NOTA: esta vulnerabilidad existe debido a una regresi\u00f3n no especificada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]}],\"references\":[{\"url\":\"http://www.osvdb.org/108060\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1089884\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2014-0686.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2014-0186\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.osvdb.org/108060\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1089884\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2014-0686.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2014-0186\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2014_0686
Vulnerability from csaf_redhat
Published
2014-06-10 12:34
Modified
2024-12-08 10:42
Summary
Red Hat Security Advisory: tomcat security update
Notes
Topic
Updated tomcat packages that fix three security issues are now available
for Red Hat Enterprise Linux 7.
The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer
Pages (JSP) technologies.
It was found that a fix for a previous security flaw introduced a
regression that could cause a denial of service in Tomcat 7. A remote
attacker could use this flaw to consume an excessive amount of CPU on the
Tomcat server by sending a specially crafted request to that server.
(CVE-2014-0186)
It was found that when Tomcat 7 processed a series of HTTP requests in
which at least one request contained either multiple content-length
headers, or one content-length header with a chunked transfer-encoding
header, Tomcat would incorrectly handle the request. A remote attacker
could use this flaw to poison a web cache, perform cross-site scripting
(XSS) attacks, or obtain sensitive information from other requests.
(CVE-2013-4286)
It was discovered that the fix for CVE-2012-3544 did not properly resolve a
denial of service flaw in the way Tomcat 7 processed chunk extensions and
trailing headers in chunked requests. A remote attacker could use this flaw
to send an excessively long request that, when processed by Tomcat, could
consume network bandwidth, CPU, and memory on the Tomcat server. Note that
chunked transfer encoding is enabled by default. (CVE-2013-4322)
All Tomcat 7 users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. Tomcat must be
restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tomcat packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nIt was found that a fix for a previous security flaw introduced a\nregression that could cause a denial of service in Tomcat 7. A remote\nattacker could use this flaw to consume an excessive amount of CPU on the\nTomcat server by sending a specially crafted request to that server.\n(CVE-2014-0186)\n\nIt was found that when Tomcat 7 processed a series of HTTP requests in\nwhich at least one request contained either multiple content-length\nheaders, or one content-length header with a chunked transfer-encoding\nheader, Tomcat would incorrectly handle the request. A remote attacker\ncould use this flaw to poison a web cache, perform cross-site scripting\n(XSS) attacks, or obtain sensitive information from other requests.\n(CVE-2013-4286)\n\nIt was discovered that the fix for CVE-2012-3544 did not properly resolve a\ndenial of service flaw in the way Tomcat 7 processed chunk extensions and\ntrailing headers in chunked requests. A remote attacker could use this flaw\nto send an excessively long request that, when processed by Tomcat, could\nconsume network bandwidth, CPU, and memory on the Tomcat server. Note that\nchunked transfer encoding is enabled by default. (CVE-2013-4322)\n\nAll Tomcat 7 users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. Tomcat must be\nrestarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0686", "url": "https://access.redhat.com/errata/RHSA-2014:0686" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1069905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069905" }, { "category": "external", "summary": "1069921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069921" }, { "category": "external", "summary": "1089884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1089884" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0686.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2024-12-08T10:42:26+00:00", "generator": { "date": "2024-12-08T10:42:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2014:0686", "initial_release_date": "2014-06-10T12:34:22+00:00", "revision_history": [ { "date": "2014-06-10T12:34:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-10T12:34:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-08T10:42:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "product": { "name": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "product_id": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-2.2-api@7.0.42-5.el7_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "product": { "name": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "product_id": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsvc@7.0.42-5.el7_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-lib-0:7.0.42-5.el7_0.noarch", "product": { "name": "tomcat-lib-0:7.0.42-5.el7_0.noarch", "product_id": "tomcat-lib-0:7.0.42-5.el7_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@7.0.42-5.el7_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "product": { "name": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "product_id": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-javadoc@7.0.42-5.el7_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-webapps-0:7.0.42-5.el7_0.noarch", "product": { "name": "tomcat-webapps-0:7.0.42-5.el7_0.noarch", "product_id": "tomcat-webapps-0:7.0.42-5.el7_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@7.0.42-5.el7_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "product": { "name": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "product_id": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@7.0.42-5.el7_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-0:7.0.42-5.el7_0.noarch", "product": { "name": "tomcat-0:7.0.42-5.el7_0.noarch", "product_id": "tomcat-0:7.0.42-5.el7_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@7.0.42-5.el7_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "product": { "name": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "product_id": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.2-api@7.0.42-5.el7_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "product": { "name": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "product_id": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@7.0.42-5.el7_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "product": { "name": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "product_id": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-3.0-api@7.0.42-5.el7_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tomcat-0:7.0.42-5.el7_0.src", "product": { "name": "tomcat-0:7.0.42-5.el7_0.src", "product_id": "tomcat-0:7.0.42-5.el7_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@7.0.42-5.el7_0?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.src" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.src", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-lib-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.src", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-lib-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.src" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.src", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-lib-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.src", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-lib-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.src" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-lib-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.src", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-lib-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.src" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-lib-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-0:7.0.42-5.el7_0.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src" }, "product_reference": "tomcat-0:7.0.42-5.el7_0.src", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-lib-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-0:7.0.42-5.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" }, "product_reference": "tomcat-webapps-0:7.0.42-5.el7_0.noarch", "relates_to_product_reference": "7Workstation-optional-7.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4286", "discovery_date": "2014-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1069921" } ], "notes": [ { "category": "description", "text": "It was found that when Tomcat / JBoss Web processed a series of HTTP requests in which at least one request contained either multiple content-length headers, or one content-length header with a chunked transfer-encoding header, Tomcat / JBoss Web would incorrectly handle the request. A remote attacker could use this flaw to poison a web cache, perform cross-site scripting (XSS) attacks, or obtain sensitive information from other requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: multiple content-length header poisoning flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4286" }, { "category": "external", "summary": "RHBZ#1069921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4286", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4286" } ], "release_date": "2014-02-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-10T12:34:22+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0686" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: multiple content-length header poisoning flaws" }, { "cve": "CVE-2013-4322", "discovery_date": "2014-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1069905" } ], "notes": [ { "category": "description", "text": "It was discovered that the fix for CVE-2012-3544 did not properly resolve a denial of service flaw in the way Tomcat and JBoss Web processed chunk extensions and trailing headers in chunked requests. A remote attacker could use this flaw to send an excessively long request that, when processed by Tomcat, could consume network bandwidth, CPU, and memory on the Tomcat server. Note that chunked transfer encoding is enabled by default.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: incomplete fix for CVE-2012-3544", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4322" }, { "category": "external", "summary": "RHBZ#1069905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4322", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4322" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4322", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4322" } ], "release_date": "2014-02-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-10T12:34:22+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0686" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: incomplete fix for CVE-2012-3544" }, { "cve": "CVE-2014-0186", "discovery_date": "2014-04-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1089884" } ], "notes": [ { "category": "description", "text": "A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat7: RHEL-7 regression causing DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0186" }, { "category": "external", "summary": "RHBZ#1089884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1089884" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0186" } ], "release_date": "2014-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-10T12:34:22+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0686" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Client-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Client-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7ComputeNode-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7ComputeNode-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Server-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Server-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-0:7.0.42-5.el7_0.src", "7Workstation-optional-7.0.Z:tomcat-admin-webapps-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-docs-webapp-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-el-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-javadoc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsp-2.2-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-jsvc-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-lib-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-servlet-3.0-api-0:7.0.42-5.el7_0.noarch", "7Workstation-optional-7.0.Z:tomcat-webapps-0:7.0.42-5.el7_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat7: RHEL-7 regression causing DoS" } ] }
wid-sec-w-2023-0754
Vulnerability from csaf_certbund
Published
2014-06-10 22:00
Modified
2023-03-26 22:00
Summary
Apache Tomcat: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache Tomcat ist ein Web-Applikationsserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache Tomcat ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen und um einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache Tomcat ist ein Web-Applikationsserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache Tomcat ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren und um einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0754 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2014/wid-sec-w-2023-0754.json" }, { "category": "self", "summary": "WID-SEC-2023-0754 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0754" }, { "category": "external", "summary": "IBM Security Bulletin 865974 vom 2023-03-26", "url": "https://www.ibm.com/support/pages/node/865974" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2014:0686-1 vom 2014-06-10", "url": "https://rhn.redhat.com/errata/RHSA-2014-0686.html" }, { "category": "external", "summary": "Oracle Third Party Vulnerability Resolution Blog vom 2015-07-14", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_apache_tomcat4" }, { "category": "external", "summary": "Debian Security Advisory DSA-3530 vom 2016-03-26", "url": "https://www.debian.org/security/2016/dsa-3530" } ], "source_lang": "en-US", "title": "Apache Tomcat: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-03-26T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:20:38.610+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0754", "initial_release_date": "2014-06-10T22:00:00.000+00:00", "revision_history": [ { "date": "2014-06-10T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2014-06-10T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2014-06-10T22:00:00.000+00:00", "number": "3", "summary": "Version nicht vorhanden" }, { "date": "2015-07-19T22:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2015-07-19T22:00:00.000+00:00", "number": "5", "summary": "Version nicht vorhanden" }, { "date": "2016-03-28T22:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2016-03-28T22:00:00.000+00:00", "number": "7", "summary": "Version nicht vorhanden" }, { "date": "2023-03-26T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Apache Tomcat \u003c 7.0.47", "product": { "name": "Apache Tomcat \u003c 7.0.47", "product_id": "241712", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:7.0.47" } } }, { "category": "product_name", "name": "Apache Tomcat \u003c 6.0.39", "product": { "name": "Apache Tomcat \u003c 6.0.39", "product_id": "T002647", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:6.0.39" } } }, { "category": "product_name", "name": "Apache Tomcat \u003c 8.0.0-RC3", "product": { "name": "Apache Tomcat \u003c 8.0.0-RC3", "product_id": "T003316", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:8.0.0:rc3" } } } ], "category": "product_name", "name": "Tomcat" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "IBM SAN Volume Controller", "product": { "name": "IBM SAN Volume Controller", "product_id": "T002782", "product_identification_helper": { "cpe": "cpe:/a:ibm:san_volume_controller:-" } } }, { "category": "product_name", "name": "IBM Storwize", "product": { "name": "IBM Storwize", "product_id": "T021621", "product_identification_helper": { "cpe": "cpe:/a:ibm:storwize:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Solaris 10", "product": { "name": "Oracle Solaris 10", "product_id": "T000300", "product_identification_helper": { "cpe": "cpe:/a:oracle:solaris:10" } } }, { "category": "product_name", "name": "Oracle Solaris 11.1", "product": { "name": "Oracle Solaris 11.1", "product_id": "T001955", "product_identification_helper": { "cpe": "cpe:/a:oracle:solaris:11.1" } } } ], "category": "product_name", "name": "Solaris" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4286", "notes": [ { "category": "description", "text": "In Apache Tomcat existiert eine Cross-Site Scripting Schwachstelle. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden, wenn ein \"HTTP connector\" oder ein \"AJP connector\" verwendet wird. Ein entfernter, anonymer Angreifer kann durch Ausnutzung dieser Schwachstelle beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T021621", "T001955", "T002782", "67646", "T000300" ] }, "release_date": "2014-06-10T22:00:00Z", "title": "CVE-2013-4286" }, { "cve": "CVE-2014-0186", "notes": [ { "category": "description", "text": "Es existiert eine nicht n\u00e4her spezifizierte Denial of Service Schwachstelle in Apache Tomcat. Ein Angreifer kann dies ausnutzen, um viel CPU-Zeit zu verbrauchen, indem er eine speziell gestaltete Anfrage an den Server sendet." } ], "product_status": { "known_affected": [ "T021621", "T001955", "T002782", "67646", "T000300" ] }, "release_date": "2014-06-10T22:00:00Z", "title": "CVE-2014-0186" } ] }
WID-SEC-W-2023-0754
Vulnerability from csaf_certbund
Published
2014-06-10 22:00
Modified
2023-03-26 22:00
Summary
Apache Tomcat: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache Tomcat ist ein Web-Applikationsserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache Tomcat ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen und um einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache Tomcat ist ein Web-Applikationsserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache Tomcat ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren und um einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0754 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2014/wid-sec-w-2023-0754.json" }, { "category": "self", "summary": "WID-SEC-2023-0754 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0754" }, { "category": "external", "summary": "IBM Security Bulletin 865974 vom 2023-03-26", "url": "https://www.ibm.com/support/pages/node/865974" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2014:0686-1 vom 2014-06-10", "url": "https://rhn.redhat.com/errata/RHSA-2014-0686.html" }, { "category": "external", "summary": "Oracle Third Party Vulnerability Resolution Blog vom 2015-07-14", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_apache_tomcat4" }, { "category": "external", "summary": "Debian Security Advisory DSA-3530 vom 2016-03-26", "url": "https://www.debian.org/security/2016/dsa-3530" } ], "source_lang": "en-US", "title": "Apache Tomcat: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-03-26T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:20:38.610+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0754", "initial_release_date": "2014-06-10T22:00:00.000+00:00", "revision_history": [ { "date": "2014-06-10T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2014-06-10T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2014-06-10T22:00:00.000+00:00", "number": "3", "summary": "Version nicht vorhanden" }, { "date": "2015-07-19T22:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2015-07-19T22:00:00.000+00:00", "number": "5", "summary": "Version nicht vorhanden" }, { "date": "2016-03-28T22:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2016-03-28T22:00:00.000+00:00", "number": "7", "summary": "Version nicht vorhanden" }, { "date": "2023-03-26T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Apache Tomcat \u003c 7.0.47", "product": { "name": "Apache Tomcat \u003c 7.0.47", "product_id": "241712", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:7.0.47" } } }, { "category": "product_name", "name": "Apache Tomcat \u003c 6.0.39", "product": { "name": "Apache Tomcat \u003c 6.0.39", "product_id": "T002647", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:6.0.39" } } }, { "category": "product_name", "name": "Apache Tomcat \u003c 8.0.0-RC3", "product": { "name": "Apache Tomcat \u003c 8.0.0-RC3", "product_id": "T003316", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:8.0.0:rc3" } } } ], "category": "product_name", "name": "Tomcat" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "IBM SAN Volume Controller", "product": { "name": "IBM SAN Volume Controller", "product_id": "T002782", "product_identification_helper": { "cpe": "cpe:/a:ibm:san_volume_controller:-" } } }, { "category": "product_name", "name": "IBM Storwize", "product": { "name": "IBM Storwize", "product_id": "T021621", "product_identification_helper": { "cpe": "cpe:/a:ibm:storwize:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Solaris 10", "product": { "name": "Oracle Solaris 10", "product_id": "T000300", "product_identification_helper": { "cpe": "cpe:/a:oracle:solaris:10" } } }, { "category": "product_name", "name": "Oracle Solaris 11.1", "product": { "name": "Oracle Solaris 11.1", "product_id": "T001955", "product_identification_helper": { "cpe": "cpe:/a:oracle:solaris:11.1" } } } ], "category": "product_name", "name": "Solaris" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4286", "notes": [ { "category": "description", "text": "In Apache Tomcat existiert eine Cross-Site Scripting Schwachstelle. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden, wenn ein \"HTTP connector\" oder ein \"AJP connector\" verwendet wird. Ein entfernter, anonymer Angreifer kann durch Ausnutzung dieser Schwachstelle beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen eine modifizierte URL oder Webseite in seinem Web-Browser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T021621", "T001955", "T002782", "67646", "T000300" ] }, "release_date": "2014-06-10T22:00:00Z", "title": "CVE-2013-4286" }, { "cve": "CVE-2014-0186", "notes": [ { "category": "description", "text": "Es existiert eine nicht n\u00e4her spezifizierte Denial of Service Schwachstelle in Apache Tomcat. Ein Angreifer kann dies ausnutzen, um viel CPU-Zeit zu verbrauchen, indem er eine speziell gestaltete Anfrage an den Server sendet." } ], "product_status": { "known_affected": [ "T021621", "T001955", "T002782", "67646", "T000300" ] }, "release_date": "2014-06-10T22:00:00Z", "title": "CVE-2014-0186" } ] }
gsd-2014-0186
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2014-0186", "description": "A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression.", "id": "GSD-2014-0186", "references": [ "https://access.redhat.com/errata/RHSA-2014:0686", "https://linux.oracle.com/cve/CVE-2014-0186.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-0186" ], "details": "A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression.", "id": "GSD-2014-0186", "modified": "2023-12-13T01:22:44.230513Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.osvdb.org/108060", "refsource": "MISC", "url": "http://www.osvdb.org/108060" }, { "name": "https://rhn.redhat.com/errata/RHSA-2014-0686.html", "refsource": "MISC", "url": "https://rhn.redhat.com/errata/RHSA-2014-0686.html" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2014-0186", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2014-0186" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1089884", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1089884" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0186" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1089884", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1089884" }, { "name": "RHSA-2014:0686", "refsource": "REDHAT", "tags": [], "url": "https://rhn.redhat.com/errata/RHSA-2014-0686.html" }, { "name": "108060", "refsource": "OSVDB", "tags": [], "url": "http://www.osvdb.org/108060" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2014-0186", "refsource": "MISC", "tags": [], "url": "https://security-tracker.debian.org/tracker/CVE-2014-0186" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T00:35Z", "publishedDate": "2014-06-14T11:18Z" } } }
ghsa-4p54-w2cj-pr32
Vulnerability from github
Published
2022-05-17 04:42
Modified
2022-05-17 04:42
Details
A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression.
{ "affected": [], "aliases": [ "CVE-2014-0186" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-06-14T11:18:00Z", "severity": "MODERATE" }, "details": "A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression.", "id": "GHSA-4p54-w2cj-pr32", "modified": "2022-05-17T04:42:15Z", "published": "2022-05-17T04:42:15Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0186" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1089884" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2014-0686.html" }, { "type": "WEB", "url": "https://security-tracker.debian.org/tracker/CVE-2014-0186" }, { "type": "WEB", "url": "http://www.osvdb.org/108060" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.