It was discovered that Tomcat incorrectly handled certain pipelined requests when sendfile was used. A remote attacker could use this issue to obtain wrong responses possibly containing sensitive information. (CVE-2017-5647)
It was discovered that Tomcat incorrectly used the appropriate facade object. A malicious application could possibly use this to bypass Security Manager restrictions. (CVE-2017-5648)
It was discovered that Tomcat incorrectly handled error pages. A remote attacker could possibly use this issue to replace or remove the custom error page. (CVE-2017-5664)
It was discovered that Tomcat incorrectly handled the CORS filter. A remote attacker could possibly use this issue to perform cache poisoning. (CVE-2017-7674)
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "7.0.52-1ubuntu0.13",
"binary_name": "libservlet3.0-java"
},
{
"binary_version": "7.0.52-1ubuntu0.13",
"binary_name": "libtomcat7-java"
},
{
"binary_version": "7.0.52-1ubuntu0.13",
"binary_name": "tomcat7"
},
{
"binary_version": "7.0.52-1ubuntu0.13",
"binary_name": "tomcat7-admin"
},
{
"binary_version": "7.0.52-1ubuntu0.13",
"binary_name": "tomcat7-common"
},
{
"binary_version": "7.0.52-1ubuntu0.13",
"binary_name": "tomcat7-docs"
},
{
"binary_version": "7.0.52-1ubuntu0.13",
"binary_name": "tomcat7-examples"
},
{
"binary_version": "7.0.52-1ubuntu0.13",
"binary_name": "tomcat7-user"
}
]
}
{
"ecosystem": "Ubuntu:14.04:LTS",
"cves": [
{
"id": "CVE-2017-5647",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2017-5648",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2017-5664",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2017-7674",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "8.0.32-1ubuntu1.5",
"binary_name": "libservlet3.1-java"
},
{
"binary_version": "8.0.32-1ubuntu1.5",
"binary_name": "libtomcat8-java"
},
{
"binary_version": "8.0.32-1ubuntu1.5",
"binary_name": "tomcat8"
},
{
"binary_version": "8.0.32-1ubuntu1.5",
"binary_name": "tomcat8-admin"
},
{
"binary_version": "8.0.32-1ubuntu1.5",
"binary_name": "tomcat8-common"
},
{
"binary_version": "8.0.32-1ubuntu1.5",
"binary_name": "tomcat8-docs"
},
{
"binary_version": "8.0.32-1ubuntu1.5",
"binary_name": "tomcat8-examples"
},
{
"binary_version": "8.0.32-1ubuntu1.5",
"binary_name": "tomcat8-user"
}
]
}
{
"ecosystem": "Ubuntu:16.04:LTS",
"cves": [
{
"id": "CVE-2017-5647",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2017-5648",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2017-5664",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2017-7674",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}