Errata overview
Errata ID 427
Date 2016-06-01
Source package tomcat6
Fixed in version 6.0.45+dfsg-1.52.201604191550
Description
This update addresses the following issues:
* CVE-2014-0033: prevent remote attackers from conducting session
  fixation attacks via crafted URLs.
* CVE-2014-0119: Fix not properly constraining class loader that accesses
  the XML parser used with an XSLT stylesheet which allowed remote
  attackers to read arbitrary files via crafted web applications.
* CVE-2014-0099: Fix integer overflow in
  java/org/apache/tomcat/util/buf/Ascii.java.
* CVE-2014-0096: Properly restrict XSLT stylesheets that allowed remote
  attackers to bypass security-manager restrictions.
* CVE-2014-0075: Fix integer overflow in the parseChunkHeader function in
  java/org/apache/coyote/http11/filters/ChunkedInputFilter.java.
* CVE-2013-4590: prevent "Tomcat internals" information leaks.
* CVE-2013-4322: prevent remote attackers from doing denial of service
  attacks.
* CVE-2013-4286: reject requests with multiple content-length headers or
  with a content-length header when chunked encoding is being used.
* Avoid CVE-2013-1571 when generating Javadoc.
* CVE-2014-0227: Add error flag to allow subsequent attempts at reading after
  an error to fail fast.
* CVE-2014-0230: Add support for maxSwallowSize.
* CVE-2014-7810: Fix potential BeanELResolver issue when running under a
  security manager.  Some classes may not be accessible but may have
  accessible interfaces.
* CVE-2015-5174: Directory traversal vulnerability in RequestUtil.java.
* CVE-2015-5345: The Mapper component in Apache Tomcat before 6.0.45
  processes redirects before considering security constraints and Filters.
* CVE-2016-0706: Apache Tomcat before 6.0.45 does not place
  org.apache.catalina.manager.StatusManagerServlet on the
  org/apache/catalina/core/RestrictedServlets.properties list which allows
  remote authenticated users to bypass intended SecurityManager
  restrictions.
* CVE-2016-0714: The session-persistence implementation in Apache Tomcat
  before 6.0.45 mishandles session attributes, which allows remote
  authenticated users to bypass intended SecurityManager restrictions.
* CVE-2016-0763: The setGlobalContext method in
  org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat does
  not consider whether ResourceLinkFactory.setGlobalContext callers are
  authorized, which allows remote authenticated users to bypass intended
  SecurityManager restrictions and read or write to arbitrary application
  data, or cause a denial of service (application disruption), via a web
  application that sets a crafted global context.
* CVE-2015-5351: The Manager and Host Manager applications in
  Apache Tomcat establish sessions and send CSRF tokens for arbitrary new
  requests, which allows remote attackers to bypass a CSRF protection
  mechanism by using a token.

The full list of changes between 6.0.35 and 6.0.45 can be seen in the
upstream changelog, which is available online at
<http://tomcat.apache.org/tomcat-6.0-doc/changelog.html>.
Additional notes
CVE ID CVE-2014-0033
CVE-2014-0119
CVE-2014-0099
CVE-2014-0096
CVE-2014-0075
CVE-2013-4590
CVE-2013-4322
CVE-2013-4286
CVE-2013-1571
CVE-2014-0227
CVE-2014-0230
CVE-2014-7810
CVE-2015-5174
CVE-2015-5345
CVE-2016-0706
CVE-2016-0714
CVE-2016-0763
CVE-2015-5351
UCS Bug number #37004