Apache Tomcat JmxRemoteLifecycleListener Bug Lets Remote Users Execute Arbitrary Code on the Target System
|
SecurityTracker Alert ID: 1037331 |
SecurityTracker URL: http://securitytracker.com/id/1037331
|
CVE Reference:
CVE-2016-3427, CVE-2016-8735
(Links to External Site)
|
Date: Nov 23 2016
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 6.0.0 to 6.0.47, 7.0.0 to 7.0.72, 8.0.0.RC1 to 8.0.38, 8.5.0 to 8.5.6, 9.0.0.M1 to 9.0.0.M11
|
Description:
A vulnerability was reported in Apache Tomcat. A remote user can execute arbitrary code on the target system.
A remote user can send specially crafted data to a JMX port to trigger a flaw in the JmxRemoteLifecycleListener and execute arbitrary code on the target system. The code will run with the privileges of the target service.
Systems running the JmxRemoteLifecycleListener are affected.
Pierre Ernst reported this vulnerability.
|
Impact:
A remote user can execute arbitrary code on the target system.
|
Solution:
The vendor has issued a fix (6.0.48, 7.0.73, 8.0.39, 8.5.8, 9.0.0.M13).
The vendor advisories are available at:
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
|
Vendor URL: tomcat.apache.org/security-9.html (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|