ALAS-2016-656

Related Vulnerabilities: CVE-2014-7810   CVE-2014-0230  

It was found that the expression language resolver evaluated expressions within a privileged code section. A malicious web application could use this flaw to bypass security manager protections. (CVE-2014-7810 ) It was found that Tomcat would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections and preventing further, legitimate connections to the Tomcat server to be made. (CVE-2014-0230 )

ALAS-2016-656


Amazon Linux AMI Security Advisory: ALAS-2016-656
Advisory Release Date: 2016-03-10 16:30 Pacific
Severity: Medium

Issue Overview:

It was found that the expression language resolver evaluated expressions within a privileged code section. A malicious web application could use this flaw to bypass security manager protections. (CVE-2014-7810 )

It was found that Tomcat would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections and preventing further, legitimate connections to the Tomcat server to be made. (CVE-2014-0230 )


Affected Packages:

tomcat6


Issue Correction:
Run yum update tomcat6 to update your system.

New Packages:
noarch:
    tomcat6-el-2.1-api-6.0.44-1.3.amzn1.noarch
    tomcat6-6.0.44-1.3.amzn1.noarch
    tomcat6-lib-6.0.44-1.3.amzn1.noarch
    tomcat6-servlet-2.5-api-6.0.44-1.3.amzn1.noarch
    tomcat6-admin-webapps-6.0.44-1.3.amzn1.noarch
    tomcat6-javadoc-6.0.44-1.3.amzn1.noarch
    tomcat6-jsp-2.1-api-6.0.44-1.3.amzn1.noarch
    tomcat6-webapps-6.0.44-1.3.amzn1.noarch
    tomcat6-docs-webapp-6.0.44-1.3.amzn1.noarch

src:
    tomcat6-6.0.44-1.3.amzn1.src