---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Apache Tomcat Multiple Vulnerabilities SECUNIA ADVISORY ID: SA28878 VERIFY ADVISORY: http://secunia.com/advisories/28878/ CRITICAL: Moderately critical IMPACT: Manipulation of data, Exposure of sensitive information WHERE: >From remote SOFTWARE: Apache Tomcat 6.x http://secunia.com/product/13828/ Apache Tomcat 5.x http://secunia.com/product/3571/ DESCRIPTION: Some vulnerabilities have been reported in Apache Tomcat, which can be exploited by malicious people to manipulate certain data or to disclose sensitive information. 1) An error exists within the native (APR based) connector when handling SSL requests. This can be exploited to trigger the duplicate processing of a recent request by connecting to the SSL port and disconnecting without sending data. The vulnerability is reported in versions 5.5.11 to 5.5.25, and 6.0.0 to 6.0.15. 2) Input containing a quote or a %5C character in cookie values is incorrectly handled in an unspecified way, which can be exploited to disclose sensitive information including session IDs. This is related to: SA26466 The vulnerability is reported in versions 5.5.0 to 5.5.25, and 6.0.0 to 6.0.14. SOLUTION: Update to version 5.5.26 or 6.0.16. PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits System Core. ORIGINAL ADVISORY: http://tomcat.apache.org/security-5.html http://tomcat.apache.org/security-6.html http://seclists.org/bugtraq/2008/Feb/0099.html OTHER REFERENCES: SA26466: http://secunia.com/advisories/26466/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------