{"affected":[{"ecosystem_specific":{"binaries":[{"tomcat6":"6.0.45-0.50.1","tomcat6-admin-webapps":"6.0.45-0.50.1","tomcat6-docs-webapp":"6.0.45-0.50.1","tomcat6-javadoc":"6.0.45-0.50.1","tomcat6-jsp-2_1-api":"6.0.45-0.50.1","tomcat6-lib":"6.0.45-0.50.1","tomcat6-servlet-2_5-api":"6.0.45-0.50.1","tomcat6-webapps":"6.0.45-0.50.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"tomcat6","purl":"pkg:rpm/suse/tomcat6&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.0.45-0.50.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"tomcat6":"6.0.45-0.50.1","tomcat6-admin-webapps":"6.0.45-0.50.1","tomcat6-docs-webapp":"6.0.45-0.50.1","tomcat6-javadoc":"6.0.45-0.50.1","tomcat6-jsp-2_1-api":"6.0.45-0.50.1","tomcat6-lib":"6.0.45-0.50.1","tomcat6-servlet-2_5-api":"6.0.45-0.50.1","tomcat6-webapps":"6.0.45-0.50.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"tomcat6","purl":"pkg:rpm/suse/tomcat6&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.0.45-0.50.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for tomcat6 fixes the following issues:\n\nThe version was updated from 6.0.41 to 6.0.45.\n\nSecurity issues fixed:\n\n* CVE-2015-5174: Directory traversal vulnerability in RequestUtil.java\n  in Apache Tomcat allowed remote authenticated users to bypass intended\n  SecurityManager restrictions and list a parent directory via a /.. (slash\n  dot dot) in a pathname used by a web application in a getResource,\n  getResourceAsStream, or getResourcePaths call, as demonstrated by the\n  $CATALINA_BASE/webapps directory.  (bsc#967967)\n* CVE-2015-5345: The Mapper component in Apache Tomcat processes redirects\n  before considering security constraints and Filters, which allowed remote\n  attackers to determine the existence of a directory via a URL that lacks\n  a trailing / (slash) character. (bsc#967965)\n* CVE-2016-0706: Apache Tomcat did not place\n  org.apache.catalina.manager.StatusManagerServlet on the\n  org/apache/catalina/core/RestrictedServlets.properties list, which\n  allowed remote authenticated users to bypass intended SecurityManager\n  restrictions and read arbitrary HTTP requests, and consequently discover\n  session ID values, via a crafted web application.  (bsc#967815)\n* CVE-2016-0714: The session-persistence implementation in Apache Tomcat\n  mishandled session attributes, which allowed remote authenticated users\n  to bypass intended SecurityManager restrictions and execute arbitrary\n  code in a privileged context via a web application that places a crafted\n  object in a session. (bsc#967964)\n","id":"SUSE-SU-2016:0839-1","modified":"2016-03-21T09:27:05Z","published":"2016-03-21T09:27:05Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160839-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/934219"},{"type":"REPORT","url":"https://bugzilla.suse.com/967815"},{"type":"REPORT","url":"https://bugzilla.suse.com/967964"},{"type":"REPORT","url":"https://bugzilla.suse.com/967965"},{"type":"REPORT","url":"https://bugzilla.suse.com/967967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-5174"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-5345"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0706"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0714"}],"related":["CVE-2015-5174","CVE-2015-5345","CVE-2016-0706","CVE-2016-0714"],"summary":"Security update for tomcat6","upstream":["CVE-2015-5174","CVE-2015-5345","CVE-2016-0706","CVE-2016-0714"]}