

INFO: The APR based Apache Tomcat Native library which allows optimal performance in production environments was not found on the : /usr/java6_64/jre/lib/ppc64/default:/usr/java6_64/jre/lib/ppc64:/usr/java6_64/jre/lib/ppc64:/usr/java6_64/jre/lib/ppc64/default:/usr/java6_64/jre/lib/ppc64/j9vm:/usr/java6_64/jre/lib/ppc64:/usr/java6_64/jre/./lib/ppc64:/usr/lib:/usr/libĢ:33:31 PM 11.Http11Protocol init I am a java developer not a Unix Admin, however, I will find out as much info as I can.Ģ:33:30 PM .AprLifecycleListener init

#Apache tomcat 6.0.35 upgrade
Vulnerability Center: 37603 - Apache Tomcat 6.0.0 Through 6.0.35 and 7.0.0 Through 7.0.I am trying to upgrade from Tomcat 5.5.34 to 6.0.35 in AIX environment. SecurityTracker: 1027833 - Apache Tomcat Bug Lets Remote Users Bypass Security Constraints X-Force: 80517 - Apache Tomcat FormAuthenticator security bypass, Medium Risk OpenVAS Name: Debian Security Advisory DSA 2725-1 (tomcat6 - several vulnerabilitiesĪctive APT Groups: 🔍 Countermeasures info Recommended: Upgrade

Nessus Name: Oracle Linux 5 : tomcat5 (ELSA-2013-0640) The entries 7073, 7075, 6303 are related to this item. The vulnerability is also documented in the databases at X-Force ( 80517), SecurityTracker ( ID 1027833), Vulnerability Center ( SBV-37603) and Tenable ( 68790). A possible mitigation has been published immediately after the disclosure of the vulnerability. Upgrading to version 6.0.36 or 7.0.30 eliminates this vulnerability. The commercial vulnerability scanner Qualys is able to test this issue with plugin 185021 (HP-UX Running Apache Multiple Vulnerabilities (HPSBUX02866)). It is assigned to the family Oracle Linux Local Security Checks. The vulnerability scanner Nessus provides a plugin with the ID 68790 (Oracle Linux 5 : tomcat5 (ELSA-2013-0640)), which helps to determine the existence of the flaw in a target environment. As 0-day the estimated underground price was around $5k-$25k. This vulnerability is assigned to T1068 by the MITRE ATT&CK project.Īfter immediately, there has been an exploit disclosed.

Technical details and a public exploit are known. The exploitation doesn't require any form of authentication. It is possible to launch the attack remotely. This vulnerability is traded as CVE-2012-3546 since. The vendor cooperated in the coordination of the public release. The weakness was shared with Tomcat Security Team as confirmed changelog entry (Website). This is going to have an impact on confidentiality, and integrity. The manipulation with an unknown input leads to a privilege escalation vulnerability.
#Apache tomcat 6.0.35 code
Affected is an unknown code of the file org/apache/catalina/realm/RealmBase.java of the component FORM Authentication Handler. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability classified as critical has been found in Apache Tomcat up to 6.0.35/7.0.29 ( Application Server Software). The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
