rhsa-2014_0835
Vulnerability from csaf_redhat
Published
2014-07-03 17:01
Modified
2024-11-22 08:09
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat7 security update

Notes

Topic
Updated tomcat7 packages that fix three security issues are now available for Red Hat JBoss Web Server 2.0.1 on Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library. It was discovered that Apache Tomcat did not limit the length of chunk sizes when using chunked transfer encoding. A remote attacker could use this flaw to perform a denial of service attack against Tomcat by streaming an unlimited quantity of data, leading to excessive consumption of server resources. (CVE-2014-0075) It was found that Apache Tomcat did not check for overflowing values when parsing request content length headers. A remote attacker could use this flaw to perform an HTTP request smuggling attack on a Tomcat server located behind a reverse proxy that processed the content length header correctly. (CVE-2014-0099) It was found that the org.apache.catalina.servlets.DefaultServlet implementation in Apache Tomcat allowed the definition of XML External Entities (XXEs) in provided XSLTs. A malicious application could use this to circumvent intended security restrictions to disclose sensitive information. (CVE-2014-0096) The CVE-2014-0075 issue was discovered by David Jorm of Red Hat Product Security. All users of Red Hat JBoss Web Server 2.0.1 are advised to upgrade to these updated tomcat7 packages, which contain backported patches to correct these issues. The Red Hat JBoss Web Server process must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated tomcat7 packages that fix three security issues are now available\nfor Red Hat JBoss Web Server 2.0.1 on Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nIt was discovered that Apache Tomcat did not limit the length of chunk\nsizes when using chunked transfer encoding. A remote attacker could use\nthis flaw to perform a denial of service attack against Tomcat by streaming\nan unlimited quantity of data, leading to excessive consumption of server\nresources. (CVE-2014-0075)\n\nIt was found that Apache Tomcat did not check for overflowing values when\nparsing request content length headers. A remote attacker could use this\nflaw to perform an HTTP request smuggling attack on a Tomcat server located\nbehind a reverse proxy that processed the content length header correctly.\n(CVE-2014-0099)\n\nIt was found that the org.apache.catalina.servlets.DefaultServlet\nimplementation in Apache Tomcat allowed the definition of XML External\nEntities (XXEs) in provided XSLTs. A malicious application could use this\nto circumvent intended security restrictions to disclose sensitive\ninformation. (CVE-2014-0096)\n\nThe CVE-2014-0075 issue was discovered by David Jorm of Red Hat Product\nSecurity.\n\nAll users of Red Hat JBoss Web Server 2.0.1 are advised to upgrade to these\nupdated tomcat7 packages, which contain backported patches to correct these\nissues. The Red Hat JBoss Web Server process must be restarted for the\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2014:0835",
        "url": "https://access.redhat.com/errata/RHSA-2014:0835"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1072776",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1072776"
      },
      {
        "category": "external",
        "summary": "1088342",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1088342"
      },
      {
        "category": "external",
        "summary": "1102030",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102030"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0835.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat7 security update",
    "tracking": {
      "current_release_date": "2024-11-22T08:09:36+00:00",
      "generator": {
        "date": "2024-11-22T08:09:36+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2014:0835",
      "initial_release_date": "2014-07-03T17:01:05+00:00",
      "revision_history": [
        {
          "date": "2014-07-03T17:01:05+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2014-07-03T17:01:05+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T08:09:36+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
                  "product_id": "5Server-JBEWS-2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
                  "product_id": "6Server-JBEWS-2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
                "product": {
                  "name": "tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_id": "tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.40-14_patch_03.ep6.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
                "product": {
                  "name": "tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_id": "tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.40-14_patch_03.ep6.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
                "product": {
                  "name": "tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_id": "tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.40-14_patch_03.ep6.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
                "product": {
                  "name": "tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_id": "tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.40-14_patch_03.ep6.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
                "product": {
                  "name": "tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_id": "tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.40-14_patch_03.ep6.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
                "product": {
                  "name": "tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_id": "tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.40-14_patch_03.ep6.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
                "product": {
                  "name": "tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_id": "tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.40-14_patch_03.ep6.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
                "product": {
                  "name": "tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_id": "tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.40-14_patch_03.ep6.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
                "product": {
                  "name": "tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_id": "tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.40-14_patch_03.ep6.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
                "product": {
                  "name": "tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_id": "tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.40-14_patch_03.ep6.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_id": "tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.40-11_patch_03.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_id": "tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.40-11_patch_03.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_id": "tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.40-11_patch_03.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_id": "tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.40-11_patch_03.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_id": "tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.40-11_patch_03.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_id": "tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.40-11_patch_03.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_id": "tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.40-11_patch_03.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_id": "tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.40-11_patch_03.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_id": "tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.40-11_patch_03.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_id": "tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.40-11_patch_03.ep6.el6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
                "product": {
                  "name": "tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
                  "product_id": "tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.40-14_patch_03.ep6.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
                "product": {
                  "name": "tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
                  "product_id": "tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.40-11_patch_03.ep6.el6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch"
        },
        "product_reference": "tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.40-14_patch_03.ep6.el5.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.src"
        },
        "product_reference": "tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch"
        },
        "product_reference": "tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch"
        },
        "product_reference": "tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch"
        },
        "product_reference": "tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch"
        },
        "product_reference": "tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch"
        },
        "product_reference": "tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch"
        },
        "product_reference": "tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch"
        },
        "product_reference": "tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch"
        },
        "product_reference": "tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch"
        },
        "product_reference": "tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.40-11_patch_03.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.src"
        },
        "product_reference": "tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "David Jorm"
          ],
          "organization": "Red Hat Product Security",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2014-0075",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2014-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1072776"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that JBoss Web / Apache Tomcat did not limit the length of chunk sizes when using chunked transfer encoding. A remote attacker could use this flaw to perform a denial of service attack against JBoss Web / Apache Tomcat by streaming an unlimited quantity of data, leading to excessive consumption of server resources.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does affect JBossWeb as shipped in Red Hat JBoss Enterprise Application Platform 5. Red Hat Product Security has rated this issue as having Moderate security impact. Red Hat JBoss Enterprise Application Platform 5 is currently in reduced support phase (Phase 2: Maintenance Support), receiving only Critical and Important security updates, hence this issue is not currently planned to be addressed in future updates for  Red Hat Enterprise Application Platform 5. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/ and the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
          "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-0075"
        },
        {
          "category": "external",
          "summary": "RHBZ#1072776",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1072776"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0075",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-0075"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0075",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0075"
        }
      ],
      "release_date": "2014-05-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-07-03T17:01:05+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
          "product_ids": [
            "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
            "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0835"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
            "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter"
    },
    {
      "cve": "CVE-2014-0096",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "discovery_date": "2014-04-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1088342"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that the org.apache.catalina.servlets.DefaultServlet implementation in JBoss Web / Apache Tomcat allowed the definition of XML External Entities (XXEs) in provided XSLTs. A malicious application could use this to circumvent intended security restrictions to disclose sensitive information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does affect JBossWeb as shipped in Red Hat JBoss Enterprise Application Platform 5. Red Hat Product Security has rated this issue as having Low security impact. Red Hat JBoss Enterprise Application Platform 5 is currently in reduced support phase (Phase 2: Maintenance Support), receiving only Critical and Important security updates, hence this issue is not currently planned to be addressed in future updates for  Red Hat Enterprise Application Platform 5. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/ and the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
          "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-0096"
        },
        {
          "category": "external",
          "summary": "RHBZ#1088342",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1088342"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0096",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-0096"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0096",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0096"
        }
      ],
      "release_date": "2014-05-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-07-03T17:01:05+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
          "product_ids": [
            "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
            "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0835"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
            "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs"
    },
    {
      "cve": "CVE-2014-0099",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2014-05-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1102030"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that JBoss Web / Apache Tomcat did not check for overflowing values when parsing request content length headers. A remote attacker could use this flaw to perform an HTTP request smuggling attack on a JBoss Web / Apache Tomcat server located behind a reverse proxy that processed the content length header correctly.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Tomcat/JBossWeb: Request smuggling via malicious content length header",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does affect JBossWeb as shipped in Red Hat JBoss Enterprise Application Platform 5. Red Hat Product Security has rated this issue as having Moderate security impact. Red Hat JBoss Enterprise Application Platform 5 is currently in reduced support phase (Phase 2: Maintenance Support), receiving only Critical and Important security updates, hence this issue is not currently planned to be addressed in future updates for  Red Hat Enterprise Application Platform 5. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/ and the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
          "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-0099"
        },
        {
          "category": "external",
          "summary": "RHBZ#1102030",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102030"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0099",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-0099"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0099",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0099"
        }
      ],
      "release_date": "2014-05-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-07-03T17:01:05+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
          "product_ids": [
            "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
            "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0835"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-0:7.0.40-14_patch_03.ep6.el5.src",
            "5Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-lib-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-log4j-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "5Server-JBEWS-2:tomcat7-webapps-0:7.0.40-14_patch_03.ep6.el5.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.40-11_patch_03.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.40-11_patch_03.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.40-11_patch_03.ep6.el6.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Tomcat/JBossWeb: Request smuggling via malicious content length header"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.