- <div class="bb-coolbox"><span class="bb-dark">This alert was generated using only banner information. It may be a false positive. </span></div><br/><strong>Fixed in Apache Tomcat 6.0.16:</strong><br/><ul> <li> <strong>low</strong>: Session hi-jacking CVE-2007-5333<br/> The previous fix for CVE-2007-3385 was incomplete. It did not consider the use of quotes or %5C within a cookie value. </li> <li> <strong>low</strong>: Elevated privileges CVE-2007-5342<br/> The JULI logging component allows web applications to provide their own logging configurations. The default security policy does not restrict this configuration and allows an untrusted web application to add files or overwrite existing files where the Tomcat process has the necessary file permissions to do so. </li> <li> <strong>important</strong>: Information disclosure CVE-2007-5461<br/> When Tomcat's WebDAV servlet is configured for use with a context and has been enabled for write, some WebDAV requests that specify an entity with a SYSTEM tag can result in the contents of arbitary files being returned to the client. </li> <li> <strong>important</strong>: Data integrity CVE-2007-6286<br/> When using the native (APR based) connector, connecting to the SSL port using netcat and then disconnecting without sending any data will cause tomcat to handle a duplicate copy of one of the recent requests. </li> <li> <strong>important</strong>: Information disclosure CVE-2008-0002<br/> If an exception occurs during the processing of parameters (eg if the client disconnects) then it is possible that the parameters submitted for that request will be incorrectly processed as part of a subsequent request. </li> </ul><br/> <span class="bb-navy">Affected Apache Tomcat version (6.0.0 - 6.0.15).</span><br/>
- Upgrade Apache Tomcat to the latest version.