Vulnerability Name: CVE-2017-6056 (CCN-122312) Assigned: 2017-02-16 Published: 2017-02-16 Updated: 2019-10-03 Summary: It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu. CVSS v3 Severity: 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Type: CWE-835 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2017-6056 Source: CCN Type: RHSA-2017-0517Important: Red Hat JBoss Enterprise Application Platform security update Source: REDHAT Type: Third Party AdvisoryRHSA-2017:0517 Source: CCN Type: RHSA-2017-0826Important: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 5 Source: REDHAT Type: Third Party AdvisoryRHSA-2017:0826 Source: CCN Type: RHSA-2017-0827Important: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 6 Source: REDHAT Type: Third Party AdvisoryRHSA-2017:0827 Source: CCN Type: RHSA-2017-0828Important: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 7 Source: REDHAT Type: Third Party AdvisoryRHSA-2017:0828 Source: CCN Type: RHSA-2017-0829Important: jboss-ec2-eap security, bug fix, and enhancement update Source: REDHAT Type: Third Party AdvisoryRHSA-2017:0829 Source: CCN Type: Apache Web siteTomcat Source: DEBIAN Type: Third Party AdvisoryDSA-3787 Source: DEBIAN Type: Third Party AdvisoryDSA-3788 Source: CCN Type: IBM Security Bulletin S1010022 (Storwize V7000 (2076))Vulnerabilities in Apache Tomcat affect SAN Volume Controller, Storwize family and FlashSystem V9000 products (CVE-2017-6056) Source: CCN Type: IBM Security Bulletin S1010073 (FlashSystem 840)A Vulnerability in Apache Tomcat affects the IBM FlashSystem models 840 and 900 Source: CCN Type: IBM Security Bulletin 1999760 (Rational Collaborative Lifecycle Management)Security vulnerabilities in Apache Tomcat affect multiple IBM Rational products based on IBM's Jazz technology Source: CCN Type: IBM Security Bulletin 2002267 (WebSphere Application Server Community Edition)Multiple Security vulnerabilities in WebSphere Application Server Community Edition Source: CCN Type: IBM Security Bulletin 2003183 (Rational Build Forge)Rational Build Forge Security Advisory (CVE-2016-8610, CVE-2017-6056, CVE-2017-5647, CVE-2017-5648) Source: CCN Type: IBM Security Bulletin 2008541 (OpenPages GRC Platform)IBM OpenPages GRC Platform has addressed multiple Apache Tomcat vulnerabilities. Source: CCN Type: IBM Security Bulletin 2013753 (Security Guardium Big Data Intelligence)IBM Security Guardium Big Data Intelligence (SonarG) is vulnerable to using Components with Known Vulnerabilities Source: CCN Type: Oracle CPUOct2019Oracle Critical Patch Update Advisory - October 2019 Source: BID Type: Third Party Advisory, VDB Entry96293 Source: CCN Type: BID-96293Apache Tomcat 'http11/AbstractInputBuffer.java' Denial of Service Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry1037860 Source: CONFIRM Type: Issue Tracking, Third Party Advisoryhttps://bugs.debian.org/851304 Source: CCN Type: ASF Bugzilla Bug 60578Server CPU maxed out (100% per core) randomly after a few hours Source: CONFIRM Type: Issue Tracking, Third Party Advisoryhttps://bz.apache.org/bugzilla/show_bug.cgi?id=60578 Source: XF Type: UNKNOWNapache-cve20176056-dos(122312) Source: MLIST Type: UNKNOWN[activemq-issues] 20190925 [jira] [Created] (AMQ-7310) Security Vulnerabilities in Tomcat-websocket-api.jar Source: MLIST Type: UNKNOWN[activemq-issues] 20190723 [jira] [Created] (AMQ-7249) Security Vulnerabilities in the ActiveMQ dependent jars. Source: CONFIRM Type: Third Party Advisoryhttps://lists.debian.org/debian-security-announce/2017/msg00038.html Source: CONFIRM Type: Third Party Advisoryhttps://lists.debian.org/debian-security-announce/2017/msg00039.html Source: CONFIRM Type: Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20180731-0002/ Source: CCN Type: IBM Security Bulletin 3011649 (Resilient)Resilient is vulnerable to Using Components with Known Vulnerabilities Source: MISC Type: UNKNOWNhttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html Source: CCN Type: WhiteSource Vulnerability DatabaseCVE-2017-6056 Vulnerable Configuration: Configuration 1 :cpe:/o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* OR cpe:/o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* OR cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:apache:tomcat:6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7:*:*:*:*:*:*:* AND cpe:/a:ibm:rational_build_forge:8.0:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:6.2:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:6.3:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:6.4:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:7.1:*:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:6:*:el6:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:7.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:8.0.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:8.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_application_server:3.0.0.4:-:community:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:5.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.7:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:5.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:7.3:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:7.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:openpages_grc_platform:7.1:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:7.5:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:7.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:6.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:7.6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:8.0.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:6.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:8.0.0.4:*:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:6.4.14:*:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:6.4.13:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:6.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium_big_data_intelligence:3.1:*:*:*:*:*:*:* OR cpe:/a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:* OR cpe:/a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:* OR cpe:/a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
canonical ubuntu linux 12.04
canonical ubuntu linux 14.04
debian debian linux 8.0
apache tomcat 6
apache tomcat 7
ibm rational build forge 8.0
ibm storwize v7000 software 6.1
ibm storwize v7000 software 6.2
ibm storwize v7000 software 6.3
ibm storwize v7000 software 6.4
ibm storwize v7000 software 7.1
redhat jboss enterprise application platform 6
ibm storwize v7000 software 7.2
ibm rational build forge 8.0.0.1
ibm rational build forge 8.0.0.2
ibm websphere application server 3.0.0.4 -
ibm rational collaborative lifecycle management 4.0
ibm rational collaborative lifecycle management 4.0.1
ibm rational collaborative lifecycle management 4.0.2
ibm rational collaborative lifecycle management 4.0.3
ibm rational collaborative lifecycle management 4.0.4
ibm rational collaborative lifecycle management 4.0.5
ibm rational collaborative lifecycle management 4.0.6
ibm rational collaborative lifecycle management 5.0
ibm rational collaborative lifecycle management 4.0.7
ibm rational collaborative lifecycle management 5.0.1
ibm rational collaborative lifecycle management 5.0.2
ibm storwize v7000 software 7.3
ibm storwize v7000 software 7.4
ibm rational collaborative lifecycle management 6.0
ibm openpages grc platform 7.1
ibm storwize v7000 software 7.5
ibm storwize v7000 software 7.6
ibm rational collaborative lifecycle management 6.0.1
ibm storwize v7000 software 7.6.1
ibm rational collaborative lifecycle management 6.0.2
ibm rational build forge 8.0.0.3
ibm rational collaborative lifecycle management 6.0.3
ibm rational build forge 8.0.0.4
redhat jboss enterprise application platform 6.4.14
redhat jboss enterprise application platform 6.4.13
ibm rational collaborative lifecycle management 6.0.4
ibm security guardium big data intelligence 3.1
oracle instantis enterprisetrack 17.1
oracle instantis enterprisetrack 17.2
oracle instantis enterprisetrack 17.3