Author: markt
Date: Mon Aug 13 19:48:57 2007
New Revision: 565612

URL: http://svn.apache.org/viewvc?view=rev&rev=565612
Log:
Update the security pages with the 6.0.14 vulnerabilities

Modified:
    tomcat/site/trunk/docs/security-3.html
    tomcat/site/trunk/docs/security-4.html
    tomcat/site/trunk/docs/security-5.html
    tomcat/site/trunk/docs/security-6.html
    tomcat/site/trunk/xdocs/security-3.xml
    tomcat/site/trunk/xdocs/security-4.xml
    tomcat/site/trunk/xdocs/security-5.xml
    tomcat/site/trunk/xdocs/security-6.xml

Modified: tomcat/site/trunk/docs/security-3.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-3.html?view=diff&rev=565612&r1=565611&r2=565612
==============================================================================
--- tomcat/site/trunk/docs/security-3.html (original)
+++ tomcat/site/trunk/docs/security-3.html Mon Aug 13 19:48:57 2007
@@ -239,6 +239,18 @@
     <p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.4, 3.3a-3.3.2</p>
 
     <p>
+<strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382";>
+       CVE-2007-3382</a>
+</p>
+
+    <p>Tomcat incorrectly treated a single quote character (') in a cookie
+       value as a delimiter. In some circumstances this lead to the leaking of
+       information such as session ID to an attacker.</p>
+
+    <p>Affects: 3.3-3.3.2</p>
+
+    <p>
 <strong>low: Cross site scripting</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3384";>
        CVE-2007-3384</a>
@@ -249,6 +261,19 @@
        from the <a href="download-33.cgi">Tomcat 3 download page</a>.</p>
 
     <p>Affects: 3.3-3.3.2</p>
+
+    <p>
+<strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385";>
+       CVE-2007-3385</a>
+</p>
+
+    <p>Tomcat incorrectly handled the character sequence \" in a cookie value.
+       In some circumstances this lead to the leaking of information such as
+       session ID to an attacker.</p>
+
+    <p>Affects: 3.3-3.3.2</p>
+
   </blockquote>
 </p>
 </td>

Modified: tomcat/site/trunk/docs/security-4.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?view=diff&rev=565612&r1=565611&r2=565612
==============================================================================
--- tomcat/site/trunk/docs/security-4.html (original)
+++ tomcat/site/trunk/docs/security-4.html Mon Aug 13 19:48:57 2007
@@ -321,6 +321,18 @@
     <p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
 
     <p>
+<strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382";>
+       CVE-2007-3382</a>
+</p>
+
+    <p>Tomcat incorrectly treated a single quote character (') in a cookie
+       value as a delimiter. In some circumstances this lead to the leaking of
+       information such as session ID to an attacker.</p>
+
+    <p>Affects: 4.1.0-4.1.36</p>
+
+    <p>
 <strong>low: Cross-site scripting</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3383";>
        CVE-2007-3383</a>
@@ -335,6 +347,19 @@
        </p>
 
     <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.36</p>
+
+    <p>
+<strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385";>
+       CVE-2007-3385</a>
+</p>
+
+    <p>Tomcat incorrectly handled the character sequence \" in a cookie value.
+       In some circumstances this lead to the leaking of information such as
+       session ID to an attacker.</p>
+
+    <p>Affects: 4.1.0-4.1.36</p>
+
   </blockquote>
 </p>
 </td>

Modified: tomcat/site/trunk/docs/security-5.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?view=diff&rev=565612&r1=565611&r2=565612
==============================================================================
--- tomcat/site/trunk/docs/security-5.html (original)
+++ tomcat/site/trunk/docs/security-5.html Mon Aug 13 19:48:57 2007
@@ -254,6 +254,41 @@
 
     <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.24</p>
 
+    <p>
+<strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382";>
+       CVE-2007-3382</a>
+</p>
+
+    <p>Tomcat incorrectly treated a single quote character (') in a cookie
+       value as a delimiter. In some circumstances this lead to the leaking of
+       information such as session ID to an attacker.</p>
+
+    <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.24</p>
+
+    <p>
+<strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385";>
+       CVE-2007-3385</a>
+</p>
+
+    <p>Tomcat incorrectly handled the character sequence \" in a cookie value.
+       In some circumstances this lead to the leaking of information such as
+       session ID to an attacker.</p>
+
+    <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.24</p>
+
+    <p>
+<strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3386";>
+       CVE-2007-3386</a>
+</p>
+
+    <p>The Host Manager Servlet did not filter user supplied data before
+       display. This enabled an XSS attack.</p>
+
+    <p>Affects: 5.5.0-5.5.24</p>
+
   </blockquote>
 </p>
 </td>

Modified: tomcat/site/trunk/docs/security-6.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?view=diff&rev=565612&r1=565611&r2=565612
==============================================================================
--- tomcat/site/trunk/docs/security-6.html (original)
+++ tomcat/site/trunk/docs/security-6.html Mon Aug 13 19:48:57 2007
@@ -214,8 +214,8 @@
 <tr>
 <td bgcolor="#525D76">
 <font color="#ffffff" face="arial,helvetica,sanserif">
-<a name="Fixed in Apache Tomcat 6.0.HEAD">
-<strong>Fixed in Apache Tomcat 6.0.HEAD</strong>
+<a name="Fixed in Apache Tomcat 6.0.14">
+<strong>Fixed in Apache Tomcat 6.0.14</strong>
 </a>
 </font>
 </td>
@@ -253,6 +253,42 @@
        the management tasks have been completed.</p>
 
     <p>Affects: 6.0.0-6.0.13</p>
+
+    <p>
+<strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382";>
+       CVE-2007-3382</a>
+</p>
+
+    <p>Tomcat incorrectly treated a single quote character (') in a cookie
+       value as a delimiter. In some circumstances this lead to the leaking of
+       information such as session ID to an attacker.</p>
+
+    <p>Affects: 6.0.0-6.0.13</p>
+
+    <p>
+<strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385";>
+       CVE-2007-3385</a>
+</p>
+
+    <p>Tomcat incorrectly handled the character sequence \" in a cookie value.
+       In some circumstances this lead to the leaking of information such as
+       session ID to an attacker.</p>
+
+    <p>Affects: 6.0.0-6.0.13</p>
+
+    <p>
+<strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3386";>
+       CVE-2007-3386</a>
+</p>
+
+    <p>The Host Manager Servlet did not filter user supplied data before
+       display. This enabled an XSS attack.</p>
+
+    <p>Affects: 6.0.0-6.0.13</p>
+
   </blockquote>
 </p>
 </td>

Modified: tomcat/site/trunk/xdocs/security-3.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-3.xml?view=diff&rev=565612&r1=565611&r2=565612
==============================================================================
--- tomcat/site/trunk/xdocs/security-3.xml (original)
+++ tomcat/site/trunk/xdocs/security-3.xml Mon Aug 13 19:48:57 2007
@@ -37,6 +37,16 @@
 
     <p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.4, 3.3a-3.3.2</p>
 
+    <p><strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382";>
+       CVE-2007-3382</a></p>
+
+    <p>Tomcat incorrectly treated a single quote character (') in a cookie
+       value as a delimiter. In some circumstances this lead to the leaking of
+       information such as session ID to an attacker.</p>
+
+    <p>Affects: 3.3-3.3.2</p>
+
     <p><strong>low: Cross site scripting</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3384";>
        CVE-2007-3384</a></p>
@@ -46,6 +56,17 @@
        from the <a href="download-33.cgi">Tomcat 3 download page</a>.</p>
 
     <p>Affects: 3.3-3.3.2</p>
+
+    <p><strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385";>
+       CVE-2007-3385</a></p>
+
+    <p>Tomcat incorrectly handled the character sequence \" in a cookie value.
+       In some circumstances this lead to the leaking of information such as
+       session ID to an attacker.</p>
+
+    <p>Affects: 3.3-3.3.2</p>
+
   </section>
 
   <section name="Fixed in Apache Tomcat 3.3.2">

Modified: tomcat/site/trunk/xdocs/security-4.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-4.xml?view=diff&rev=565612&r1=565611&r2=565612
==============================================================================
--- tomcat/site/trunk/xdocs/security-4.xml (original)
+++ tomcat/site/trunk/xdocs/security-4.xml Mon Aug 13 19:48:57 2007
@@ -90,6 +90,16 @@
 
     <p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
 
+    <p><strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382";>
+       CVE-2007-3382</a></p>
+
+    <p>Tomcat incorrectly treated a single quote character (') in a cookie
+       value as a delimiter. In some circumstances this lead to the leaking of
+       information such as session ID to an attacker.</p>
+
+    <p>Affects: 4.1.0-4.1.36</p>
+
     <p><strong>low: Cross-site scripting</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3383";>
        CVE-2007-3383</a></p>
@@ -103,6 +113,17 @@
        </p>
 
     <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.36</p>
+
+    <p><strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385";>
+       CVE-2007-3385</a></p>
+
+    <p>Tomcat incorrectly handled the character sequence \" in a cookie value.
+       In some circumstances this lead to the leaking of information such as
+       session ID to an attacker.</p>
+
+    <p>Affects: 4.1.0-4.1.36</p>
+
   </section>
 
   <section name="Fixed in Apache Tomcat 4.1.36">

Modified: tomcat/site/trunk/xdocs/security-5.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?view=diff&rev=565612&r1=565611&r2=565612
==============================================================================
--- tomcat/site/trunk/xdocs/security-5.xml (original)
+++ tomcat/site/trunk/xdocs/security-5.xml Mon Aug 13 19:48:57 2007
@@ -51,6 +51,35 @@
 
     <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.24</p>
 
+    <p><strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382";>
+       CVE-2007-3382</a></p>
+
+    <p>Tomcat incorrectly treated a single quote character (') in a cookie
+       value as a delimiter. In some circumstances this lead to the leaking of
+       information such as session ID to an attacker.</p>
+
+    <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.24</p>
+
+    <p><strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385";>
+       CVE-2007-3385</a></p>
+
+    <p>Tomcat incorrectly handled the character sequence \" in a cookie value.
+       In some circumstances this lead to the leaking of information such as
+       session ID to an attacker.</p>
+
+    <p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.24</p>
+
+    <p><strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3386";>
+       CVE-2007-3386</a></p>
+
+    <p>The Host Manager Servlet did not filter user supplied data before
+       display. This enabled an XSS attack.</p>
+
+    <p>Affects: 5.5.0-5.5.24</p>
+
   </section>
 
   <section name="Fixed in Apache Tomcat 5.5.24, 5.0.HEAD">

Modified: tomcat/site/trunk/xdocs/security-6.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?view=diff&rev=565612&r1=565611&r2=565612
==============================================================================
--- tomcat/site/trunk/xdocs/security-6.xml (original)
+++ tomcat/site/trunk/xdocs/security-6.xml Mon Aug 13 19:48:57 2007
@@ -24,7 +24,7 @@
 
   </section>
 
-  <section name="Fixed in Apache Tomcat 6.0.HEAD">
+  <section name="Fixed in Apache Tomcat 6.0.14">
     <p><strong>low: Cross-site scripting</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449";>
        CVE-2007-2449</a></p>
@@ -50,6 +50,36 @@
        the management tasks have been completed.</p>
 
     <p>Affects: 6.0.0-6.0.13</p>
+
+    <p><strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382";>
+       CVE-2007-3382</a></p>
+
+    <p>Tomcat incorrectly treated a single quote character (') in a cookie
+       value as a delimiter. In some circumstances this lead to the leaking of
+       information such as session ID to an attacker.</p>
+
+    <p>Affects: 6.0.0-6.0.13</p>
+
+    <p><strong>low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385";>
+       CVE-2007-3385</a></p>
+
+    <p>Tomcat incorrectly handled the character sequence \" in a cookie value.
+       In some circumstances this lead to the leaking of information such as
+       session ID to an attacker.</p>
+
+    <p>Affects: 6.0.0-6.0.13</p>
+
+    <p><strong>low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3386";>
+       CVE-2007-3386</a></p>
+
+    <p>The Host Manager Servlet did not filter user supplied data before
+       display. This enabled an XSS attack.</p>
+
+    <p>Affects: 6.0.0-6.0.13</p>
+
   </section>
 
   <section name="Fixed in Apache Tomcat 6.0.11">



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to