RHSA-2014:0865: tomcat6 security and bug fix update (Moderate)
Description:
Apache Tomcat is a servlet container for the Java Servlet and JavaServerPages (JSP) technologies.It was discovered that Apache Tomcat did not limit the length of chunksizes when using chunked transfer encoding. A remote attacker could usethis flaw to perform a denial of service attack against Tomcat by streamingan unlimited quantity of data, leading to excessive consumption of serverresources. (CVE-2014-0075)It was found that Apache Tomcat did not check for overflowing values whenparsing request content length headers. A remote attacker could use thisflaw to perform an HTTP request smuggling attack on a Tomcat server locatedbehind a reverse proxy that processed the content length header correctly.(CVE-2014-0099)It was found that the org.apache.catalina.servlets.DefaultServletimplementation in Apache Tomcat allowed the definition of XML ExternalEntities (XXEs) in provided XSLTs. A malicious application could use thisto circumvent intended security restrictions to disclose sensitiveinformation. (CVE-2014-0096)The CVE-2014-0075 issue was discovered by David Jorm of Red Hat ProductSecurity.This update also fixes the following bugs:* The patch that resolved the CVE-2014-0050 issue contained redundant code.This update removes the redundant code. (BZ#1094528)* The patch that resolved the CVE-2013-4322 issue contained an invalidcheck that triggered a java.io.EOFException while reading trailer headersfor chunked requests. This update fixes the check and the aforementionedexception is no longer triggered in the described scenario. (BZ#1095602)All Tomcat 6 users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. Tomcat must berestarted for this update to take effect.