Apache Tomcat Multiple Vulnerabilities-01 (Nov14)

Summary
This host is running Apache Tomcat and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to cause a denial of service (resource consumption), bypass security-manager restrictions and read arbitrary files, conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header. Impact Level: Application
Solution
Upgrade to version 6.0.40, 7.0.53, 8.0.4 or later. For updates refer to refer http://tomcat.apache.org
Insight
Multiple flaws are due to, - An Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java - The java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in does not properly restrict XSLT stylesheets. - Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in when operated behind a reverse proxy
Affected
Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References