The Tomcat init script in the tomcat7 package before 7.0.56-3+deb8u4 and tomcat8 package before 8.0.14-1+deb8u3 on Debian jessie and the tomcat6 and libtomcat6-java packages before 6.0.35-1ubuntu3.8 on Ubuntu 12.04 LTS, the tomcat7 and libtomcat7-java packages before 7.0.52-1ubuntu0.7 on Ubuntu 14.04 LTS, and tomcat8 and libtomcat8-java packages before 8.0.32-1ubuntu1.2 on Ubuntu 16.04 LTS allows local users with access to the tomcat account to gain root privileges via a symlink attack on the Catalina log file, as demonstrated by /var/log/tomcat7/catalina.out.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-622-1 | tomcat6 security update |
Debian DLA |
DLA-623-1 | tomcat7 security update |
Debian DSA |
DSA-3669-1 | tomcat7 security update |
Debian DSA |
DSA-3670-1 | tomcat8 security update |
Ubuntu USN |
USN-3081-1 | Tomcat vulnerability |
Ubuntu USN |
USN-3081-2 | Tomcat vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-05T22:48:13.696Z
Reserved: 2015-12-27T00:00:00
Link: CVE-2016-1240
No data.
Status : Deferred
Published: 2016-10-03T15:59:00.207
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-1240
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN