CVE-2016-0763
Publication date 24 February 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context.
From the Ubuntu Security Team
It was discovered that the Tomcat setGlobalContext method incorrectly checked if callers were authorized. A remote attacker could possibly use this issue to read or wite to arbitrary application data, or cause a denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
tomcat6 | 18.04 LTS bionic | Not in release |
16.04 LTS xenial |
Fixed 6.0.45+dfsg-1
|
|
14.04 LTS trusty |
Fixed 6.0.39-1ubuntu0.1
|
|
tomcat7 | 18.04 LTS bionic |
Not affected
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Fixed 7.0.52-1ubuntu0.6
|
|
tomcat8 | 18.04 LTS bionic |
Not affected
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
Patch details
Package | Patch details |
---|---|
tomcat6 | |
tomcat7 | |
tomcat8 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.3 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | Low |
Vector | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
References
Related Ubuntu Security Notices (USN)
- USN-3024-1
- Tomcat vulnerabilities
- 5 July 2016