Author: markt Date: Wed Apr 25 19:38:37 2007 New Revision: 532578 URL: http://svn.apache.org/viewvc?view=rev&rev=532578 Log: More security updates.
Modified: tomcat/site/trunk/docs/security-4.html tomcat/site/trunk/docs/security-5.html tomcat/site/trunk/docs/security-jk.html tomcat/site/trunk/xdocs/security-4.xml tomcat/site/trunk/xdocs/security-5.xml tomcat/site/trunk/xdocs/security-jk.xml Modified: tomcat/site/trunk/docs/security-4.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?view=diff&rev=532578&r1=532577&r2=532578 ============================================================================== --- tomcat/site/trunk/docs/security-4.html (original) +++ tomcat/site/trunk/docs/security-4.html Wed Apr 25 19:38:37 2007 @@ -393,6 +393,18 @@ <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.31</p> <p> +<strong>low: Cross-site scripting</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4838"> + CVE-2005-4838</a> +</p> + + <p>Various JSPs included as part of the JSP examples and the Tomcat Manager + are susceptible to a cross-site scripting attack as they do not escape + user provided data before including it in the returned page.</p> + + <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.31</p> + + <p> <strong>important: Denial of service</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3510"> CVE-2005-3510</a> Modified: tomcat/site/trunk/docs/security-5.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?view=diff&rev=532578&r1=532577&r2=532578 ============================================================================== --- tomcat/site/trunk/docs/security-5.html (original) +++ tomcat/site/trunk/docs/security-5.html Wed Apr 25 19:38:37 2007 @@ -379,8 +379,8 @@ <tr> <td bgcolor="#525D76"> <font color="#ffffff" face="arial,helvetica,sanserif"> -<a name="Fixed in Apache Tomcat 5.5.16"> -<strong>Fixed in Apache Tomcat 5.5.16</strong> +<a name="Fixed in Apache Tomcat 5.5.16, 5.0.HEAD"> +<strong>Fixed in Apache Tomcat 5.5.16, 5.0.HEAD</strong> </a> </font> </td> @@ -399,7 +399,7 @@ susceptible to a cross-site scripting attack as it does not escape user provided data before including it in the returned page.</p> - <p>Affects: 5.0.0-5.0.HEAD, 5.5.0-5.5.15</p> + <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.15</p> </blockquote> </p> </td> @@ -455,6 +455,41 @@ for large directories, by caching directory listings.</p> <p>Affects: 5.0.0-5.5.30, 5.5.0-5.5.12</p> + </blockquote> +</p> +</td> +</tr> +<tr> +<td> +<br/> +</td> +</tr> +</table> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> +<tr> +<td bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica,sanserif"> +<a name="Fixed in Apache Tomcat 5.5.7, 5.0.HEAD"> +<strong>Fixed in Apache Tomcat 5.5.7, 5.0.HEAD</strong> +</a> +</font> +</td> +</tr> +<tr> +<td> +<p> +<blockquote> + <p> +<strong>low: Cross-site scripting</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4838"> + CVE-2005-4838</a> +</p> + + <p>Various JSPs included as part of the JSP examples and the Tomcat Manager + are susceptible to a cross-site scripting attack as they do not escape + user provided data before including it in the returned page.</p> + + <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.6</p> </blockquote> </p> </td> Modified: tomcat/site/trunk/docs/security-jk.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-jk.html?view=diff&rev=532578&r1=532577&r2=532578 ============================================================================== --- tomcat/site/trunk/docs/security-jk.html (original) +++ tomcat/site/trunk/docs/security-jk.html Wed Apr 25 19:38:37 2007 @@ -244,6 +244,45 @@ </td> </tr> </table> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> +<tr> +<td bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica,sanserif"> +<a name="Fixed in Apache Tomcat JK Connector 1.2.16"> +<strong>Fixed in Apache Tomcat JK Connector 1.2.16</strong> +</a> +</font> +</td> +</tr> +<tr> +<td> +<p> +<blockquote> + <p> +<strong>important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7197"> + CVE-2006-7197</a> +</p> + + <p>The Tomcat AJP connector contained a bug that sometimes set a too long + length for the chunks delivered by send_body_chunks AJP messages. Bugs of + this type can cause mod_jk to read beyond buffer boundaries and thus + reveal sensitive memory information to a client.</p> + + <p>Affects: JK 1.2.0-1.2.15<br/> + Source shipped with: Tomcat 4.0.1-4.0.6, 4.1.0-4.1.32, 5.0.0-5.0.30, + 5.5.0-5.5.16</p> + + </blockquote> +</p> +</td> +</tr> +<tr> +<td> +<br/> +</td> +</tr> +</table> </td> </tr> <!--FOOTER SEPARATOR--> Modified: tomcat/site/trunk/xdocs/security-4.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-4.xml?view=diff&rev=532578&r1=532577&r2=532578 ============================================================================== --- tomcat/site/trunk/xdocs/security-4.xml (original) +++ tomcat/site/trunk/xdocs/security-4.xml Wed Apr 25 19:38:37 2007 @@ -140,6 +140,16 @@ <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.31</p> + <p><strong>low: Cross-site scripting</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4838"> + CVE-2005-4838</a></p> + + <p>Various JSPs included as part of the JSP examples and the Tomcat Manager + are susceptible to a cross-site scripting attack as they do not escape + user provided data before including it in the returned page.</p> + + <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.31</p> + <p><strong>important: Denial of service</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3510"> CVE-2005-3510</a></p> Modified: tomcat/site/trunk/xdocs/security-5.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?view=diff&rev=532578&r1=532577&r2=532578 ============================================================================== --- tomcat/site/trunk/xdocs/security-5.xml (original) +++ tomcat/site/trunk/xdocs/security-5.xml Wed Apr 25 19:38:37 2007 @@ -100,7 +100,7 @@ <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.17</p> </section> - <section name="Fixed in Apache Tomcat 5.5.16"> + <section name="Fixed in Apache Tomcat 5.5.16, 5.0.HEAD"> <p><strong>low: Cross-site scripting</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7196"> CVE-2006-7196</a></p> @@ -109,7 +109,7 @@ susceptible to a cross-site scripting attack as it does not escape user provided data before including it in the returned page.</p> - <p>Affects: 5.0.0-5.0.HEAD, 5.5.0-5.5.15</p> + <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.15</p> </section> @@ -141,6 +141,18 @@ for large directories, by caching directory listings.</p> <p>Affects: 5.0.0-5.5.30, 5.5.0-5.5.12</p> + </section> + + <section name="Fixed in Apache Tomcat 5.5.7, 5.0.HEAD"> + <p><strong>low: Cross-site scripting</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4838"> + CVE-2005-4838</a></p> + + <p>Various JSPs included as part of the JSP examples and the Tomcat Manager + are susceptible to a cross-site scripting attack as they do not escape + user provided data before including it in the returned page.</p> + + <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.6</p> </section> <section name="Not a vulnerability in Tomcat"> Modified: tomcat/site/trunk/xdocs/security-jk.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-jk.xml?view=diff&rev=532578&r1=532577&r2=532578 ============================================================================== --- tomcat/site/trunk/xdocs/security-jk.xml (original) +++ tomcat/site/trunk/xdocs/security-jk.xml Wed Apr 25 19:38:37 2007 @@ -37,6 +37,23 @@ Source shipped with: Tomcat 4.1.34, 5.5.20</p> </section> + + <section name="Fixed in Apache Tomcat JK Connector 1.2.16"> + <p><strong>important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7197"> + CVE-2006-7197</a></p> + + <p>The Tomcat AJP connector contained a bug that sometimes set a too long + length for the chunks delivered by send_body_chunks AJP messages. Bugs of + this type can cause mod_jk to read beyond buffer boundaries and thus + reveal sensitive memory information to a client.</p> + + <p>Affects: JK 1.2.0-1.2.15<br/> + Source shipped with: Tomcat 4.0.1-4.0.6, 4.1.0-4.1.32, 5.0.0-5.0.30, + 5.5.0-5.5.16</p> + + </section> + </body> </document> --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]