Vulnerabilities > CVE-2018-1336 - Infinite Loop vulnerability in multiple products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
low complexity
apache
redhat
debian
canonical
CWE-835
nessus

Summary

An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86.

Vulnerable Configurations

Part Description Count
Application
Apache
177
Application
Redhat
4
OS
Debian
2
OS
Canonical
2
OS
Redhat
5

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-2701.NASL
    descriptionAn update is now available for Red Hat JBoss Web Server 3.1 for RHEL 6 and Red Hat JBoss Web Server 3.1 for RHEL 7. Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library. This release of Red Hat JBoss Web Server 3.1 Service Pack 5 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id117471
    published2018-09-13
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/117471
    titleRHEL 6 / 7 : Red Hat JBoss Web Server 3.1.0 Service Pack 5 (RHSA-2018:2701)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2018:2701. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(117471);
      script_version("1.6");
      script_cvs_date("Date: 2019/10/24 15:35:45");
    
      script_cve_id("CVE-2018-1336");
      script_xref(name:"RHSA", value:"2018:2701");
    
      script_name(english:"RHEL 6 / 7 : Red Hat JBoss Web Server 3.1.0 Service Pack 5 (RHSA-2018:2701)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update is now available for Red Hat JBoss Web Server 3.1 for RHEL 6
    and Red Hat JBoss Web Server 3.1 for RHEL 7.
    
    Red Hat Product Security has rated this release as having a security
    impact of Important. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Red Hat JBoss Web Server is a fully integrated and certified set of
    components for hosting Java web applications. It is comprised of the
    Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat
    Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and
    the Tomcat Native library.
    
    This release of Red Hat JBoss Web Server 3.1 Service Pack 5 serves as
    a replacement for Red Hat JBoss Web Server 3.1, and includes bug
    fixes, which are documented in the Release Notes document linked to in
    the References.
    
    Security Fix(es) :
    
    * tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336)
    
    For more details about the security issue(s), including the impact, a
    CVSS score, acknowledgments, and other related information, refer to
    the CVE page(s) listed in the References section."
      );
      # https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/3.1/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?0349df1b"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2018:2701"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2018-1336"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat7");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat7-admin-webapps");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat7-docs-webapp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat7-el-2.2-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat7-javadoc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat7-jsp-2.2-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat7-jsvc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat7-lib");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat7-log4j");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat7-selinux");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat7-servlet-3.0-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat7-webapps");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat8");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat8-admin-webapps");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat8-docs-webapp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat8-el-2.2-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat8-javadoc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat8-jsp-2.3-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat8-jsvc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat8-lib");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat8-log4j");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat8-selinux");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat8-servlet-3.1-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:tomcat8-webapps");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/08/02");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/09/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/09/13");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(6|7)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 6.x / 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2018:2701";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL6", reference:"tomcat7-7.0.70-29.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat7-admin-webapps-7.0.70-29.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat7-docs-webapp-7.0.70-29.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat7-el-2.2-api-7.0.70-29.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat7-javadoc-7.0.70-29.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat7-jsp-2.2-api-7.0.70-29.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat7-jsvc-7.0.70-29.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat7-lib-7.0.70-29.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat7-log4j-7.0.70-29.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat7-selinux-7.0.70-29.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat7-servlet-3.0-api-7.0.70-29.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat7-webapps-7.0.70-29.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat8-8.0.36-33.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat8-admin-webapps-8.0.36-33.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat8-docs-webapp-8.0.36-33.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat8-el-2.2-api-8.0.36-33.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat8-javadoc-8.0.36-33.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat8-jsp-2.3-api-8.0.36-33.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat8-jsvc-8.0.36-33.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat8-lib-8.0.36-33.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat8-log4j-8.0.36-33.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat8-selinux-8.0.36-33.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat8-servlet-3.1-api-8.0.36-33.ep7.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"tomcat8-webapps-8.0.36-33.ep7.el6")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"tomcat7-7.0.70-29.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat7-admin-webapps-7.0.70-29.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat7-docs-webapp-7.0.70-29.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat7-el-2.2-api-7.0.70-29.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat7-javadoc-7.0.70-29.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat7-jsp-2.2-api-7.0.70-29.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat7-jsvc-7.0.70-29.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat7-lib-7.0.70-29.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat7-log4j-7.0.70-29.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat7-selinux-7.0.70-29.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat7-servlet-3.0-api-7.0.70-29.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat7-webapps-7.0.70-29.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat8-8.0.36-33.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat8-admin-webapps-8.0.36-33.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat8-docs-webapp-8.0.36-33.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat8-el-2.2-api-8.0.36-33.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat8-javadoc-8.0.36-33.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat8-jsp-2.3-api-8.0.36-33.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat8-jsvc-8.0.36-33.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat8-lib-8.0.36-33.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat8-log4j-8.0.36-33.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat8-selinux-8.0.36-33.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat8-servlet-3.1-api-8.0.36-33.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"tomcat8-webapps-8.0.36-33.ep7.el7")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "tomcat7 / tomcat7-admin-webapps / tomcat7-docs-webapp / etc");
      }
    }
    
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20181016_TOMCAT_ON_SL7_X.NASL
    descriptionSecurity Fix(es) : - tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336)
    last seen2020-03-18
    modified2018-10-17
    plugin id118167
    published2018-10-17
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118167
    titleScientific Linux Security Update : tomcat on SL7.x (noarch) (20181016)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2018-2921.NASL
    descriptionAn update for tomcat is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es) : * tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id118156
    published2018-10-17
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118156
    titleCentOS 7 : tomcat (CESA-2018:2921)
  • NASL familyMisc.
    NASL idSYMANTEC_CONTENT_ANALYSIS_SYMSA1463.NASL
    descriptionThe version of Symantec Content Analysis running on the remote host is prior to version 2.3.5.1. It is, therefore, affected by multiple vulnerabilities: - An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. (CVE-2018-1336) - When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 did not correctly handle invalid responses. This allowed for revoked client certificates to be incorrectly identified. It was therefore possible for users to authenticate with revoked certificates when using mutual TLS.(CVE-2018-8019) - Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 has a flaw that does not properly check OCSP pre-produced responses, which are lists (multiple entries) of certificate statuses. (CVE-2018-8020) - The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. (CVE-2018-8034)
    last seen2020-06-01
    modified2020-06-02
    plugin id125550
    published2019-05-30
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125550
    titleSymantec Content Analysis < 2.3.5.1 affected by Multiple Vulnerabilities (SYMSA1463)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2018-1129.NASL
    descriptionThis update for tomcat to version 9.0.10 fixes the following issues : Security issues fixed : - CVE-2018-1336: An improper handing of overflow in the UTF-8 decoder with supplementary characters could have lead to an infinite loop in the decoder causing a Denial of Service (bsc#1102400). - CVE-2018-8014: Fix insecure default CORS filter settings (bsc#1093697). - CVE-2018-8034: The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default (bsc#1102379). - CVE-2018-8037: If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could have resulted in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also have resulted in a user seeing a response intended for another user (bsc#1102410). Bug fixes : - Avoid overwriting of customer
    last seen2020-06-05
    modified2018-10-09
    plugin id117983
    published2018-10-09
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/117983
    titleopenSUSE Security Update : tomcat (openSUSE-2018-1129)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2018-1019.NASL
    descriptionThis update for tomcat to 8.0.53 fixes the following issues : Security issue fixed : - CVE-2018-1336: An improper handing of overflow in the UTF-8 decoder with supplementary characters could have lead to an infinite loop in the decoder causing a Denial of Service (bsc#1102400). - CVE-2018-8034: The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default (bsc#1102379). - CVE-2018-8037: If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could have resulted in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also have resulted in a user seeing a response intended for another user (bsc#1102410). - CVE-2018-8014: Fix insecure default CORS filter settings (bsc#1093697). Bug fixes : - bsc#1067720: Avoid overwriting of customer
    last seen2020-06-05
    modified2018-09-17
    plugin id117526
    published2018-09-17
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/117526
    titleopenSUSE Security Update : tomcat (openSUSE-2018-1019)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2018-1055.NASL
    descriptionThe defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable
    last seen2020-06-01
    modified2020-06-02
    plugin id111610
    published2018-08-10
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111610
    titleAmazon Linux AMI : tomcat7 / tomcat80 (ALAS-2018-1055)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-2741.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.21 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.20, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * hibernate-validator: Privilege escalation when running under the security manager (CVE-2017-7536) * guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service (CVE-2018-10237) * picketlink: The fix for CVE-2017-2582 breaks the feature of attribute replacement with system property in picketlink.xml (CVE-2017-2582) * jbossweb: tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. The CVE-2017-2582 issue was discovered by Hynek Mlnarik (Red Hat) and the CVE-2017-7536 issue was discovered by Gunnar Morling (Red Hat).
    last seen2020-06-01
    modified2020-06-02
    plugin id117771
    published2018-09-27
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/117771
    titleRHEL 7 : JBoss EAP (RHSA-2018:2741)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2018-1385.NASL
    descriptionAccording to the version of the tomcat packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-15
    modified2018-12-10
    plugin id119513
    published2018-12-10
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/119513
    titleEulerOS 2.0 SP3 : tomcat (EulerOS-SA-2018-1385)
  • NASL familyAmazon Linux Local Security Checks
    NASL idAL2_ALAS-2018-1105.NASL
    descriptionAn improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service.(CVE-2018-1336)
    last seen2020-06-01
    modified2020-06-02
    plugin id118836
    published2018-11-09
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118836
    titleAmazon Linux 2 : tomcat (ALAS-2018-1105)
  • NASL familyWeb Servers
    NASL idTOMCAT_9_0_8.NASL
    descriptionA denial of service (DoS) vulnerability exists in Apache Tomcat, in versions between 9.0.0.M1 and 9.0.7 (inclusive), due to improper overflow handling in the UTF-8 decoder component. An unauthenticated, remote attacker can exploit this issue, to cause the application to stop responding.
    last seen2020-03-18
    modified2019-02-27
    plugin id122447
    published2019-02-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122447
    titleApache Tomcat 9.0.0.M1 < 9.0.8 Denial of Service Vulnerability
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0031_TOMCAT.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has tomcat packages installed that are affected by a vulnerability: - An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86. (CVE-2018-1336) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127197
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127197
    titleNewStart CGSL CORE 5.04 / MAIN 5.04 : tomcat Vulnerability (NS-SA-2019-0031)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2018-2921.NASL
    descriptionFrom Red Hat Security Advisory 2018:2921 : An update for tomcat is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es) : * tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id118161
    published2018-10-17
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118161
    titleOracle Linux 7 : tomcat (ELSA-2018-2921)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-770.NASL
    descriptionThis update for tomcat to version 9.0.10 fixes the following issues : Security issues fixed : - CVE-2018-1336: An improper handing of overflow in the UTF-8 decoder with supplementary characters could have lead to an infinite loop in the decoder causing a Denial of Service (bsc#1102400). - CVE-2018-8014: Fix insecure default CORS filter settings (bsc#1093697). - CVE-2018-8034: The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default (bsc#1102379). - CVE-2018-8037: If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could have resulted in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also have resulted in a user seeing a response intended for another user (bsc#1102410). Bug fixes : - Avoid overwriting of customer
    last seen2020-06-01
    modified2020-06-02
    plugin id123330
    published2019-03-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123330
    titleopenSUSE Security Update : tomcat (openSUSE-2019-770)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3723-1.NASL
    descriptionIt was discovered that Tomcat incorrectly handled decoding certain UTF-8 strings. A remote attacker could possibly use this issue to cause Tomcat to crash, resulting in a denial of service. (CVE-2018-1336) It was discovered that the Tomcat WebSocket client incorrectly performed hostname verification. A remote attacker could possibly use this issue to intercept sensitive information. (CVE-2018-8034). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id111349
    published2018-07-26
    reporterUbuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111349
    titleUbuntu 14.04 LTS / 16.04 LTS : tomcat7, tomcat8 vulnerabilities (USN-3723-1)
  • NASL familyWeb Servers
    NASL idTOMCAT_8_0_52.NASL
    descriptionAccording to its self-reported version number, the Apache Tomcat instance listening on the remote host is 8.0.x < 8.0.52, 8.5.x < 8.5.31 or 9.0.x < 9.0.8. It is, therefore, affected by the following vulnerability: - A denial of service (DoS) vulnerability exists in Tomcat due to improper overflow handling in the UTF-8 decoder. An unauthenticated, remote attacker can exploit this issue to cause an infinite loop in the decoder, leading to a denial of service condition. Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-03-18
    modified2019-01-11
    plugin id121124
    published2019-01-11
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/121124
    titleApache Tomcat 8.0.x < 8.0.52 / 8.5.x < 8.5.31 / 9.0.x < 9.0.8 Denial of Service
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-2921.NASL
    descriptionAn update for tomcat is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es) : * tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id118162
    published2018-10-17
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118162
    titleRHEL 7 : tomcat (RHSA-2018:2921)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1491.NASL
    descriptionTwo security issues have been discovered in the Tomcat servlet and JSP engine. CVE-2018-1336 An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. CVE-2018-8034 The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. For Debian 8
    last seen2020-06-01
    modified2020-06-02
    plugin id112230
    published2018-09-04
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/112230
    titleDebian DLA-1491-1 : tomcat8 security update
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-2743.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.21 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.20, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * hibernate-validator: Privilege escalation when running under the security manager (CVE-2017-7536) * guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service (CVE-2018-10237) * picketlink: The fix for CVE-2017-2582 breaks the feature of attribute replacement with system property in picketlink.xml (CVE-2017-2582) * jbossweb: tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. The CVE-2017-2582 issue was discovered by Hynek Mlnarik (Red Hat) and the CVE-2017-7536 issue was discovered by Gunnar Morling (Red Hat).
    last seen2020-06-01
    modified2020-06-02
    plugin id117772
    published2018-09-27
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/117772
    titleRHEL 6 : JBoss EAP (RHSA-2018:2743)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4281.NASL
    descriptionSeveral issues were discovered in the Tomcat servlet and JSP engine. They could lead to unauthorized access to protected resources, denial-of-service, or information leak.
    last seen2020-06-01
    modified2020-06-02
    plugin id112185
    published2018-08-30
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/112185
    titleDebian DSA-4281-1 : tomcat8 - security update
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2018-1415.NASL
    descriptionAccording to the version of the tomcat packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-06
    modified2018-12-28
    plugin id119904
    published2018-12-28
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/119904
    titleEulerOS 2.0 SP2 : tomcat (EulerOS-SA-2018-1415)
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL73008537.NASL
    descriptionAn improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86. (CVE-2018-1336) Impact BIG-IP and Traffix SDC A remote attacker can exploit this vulnerability with carefully crafted data and cause a denial of service (DoS) on the target system. Enterprise Manager, BIG-IQ, and iWorkflow There is no impact; these F5 products are not affected by this vulnerability.
    last seen2020-04-03
    modified2018-12-14
    plugin id119668
    published2018-12-14
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/119668
    titleF5 Networks BIG-IP : Apache Tomcat vulnerability (K73008537)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2018-1056.NASL
    descriptionThe defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable
    last seen2020-06-01
    modified2020-06-02
    plugin id111611
    published2018-08-10
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111611
    titleAmazon Linux AMI : tomcat8 (ALAS-2018-1056)
  • NASL familyWeb Servers
    NASL idTOMCAT_7_0_88.NASL
    descriptionAccording to its self-reported version number, the Apache Tomcat instance listening on the remote host is 7.0.x prior to 7.0.88. It is, therefore, affected by the following vulnerability: - A denial of service (DoS) vulnerability exists in Tomcat due to improper overflow handling in the UTF-8 decoder. An unauthenticated, remote attacker can exploit this issue to cause an infinite loop in the decoder, leading to a denial of service condition. Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-03-18
    modified2019-01-11
    plugin id121121
    published2019-01-11
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/121121
    titleApache Tomcat 7.0.x < 7.0.88 Denial of Service

Redhat

advisories
  • bugzilla
    id1607591
    titleCVE-2018-1336 tomcat: A bug in the UTF-8 decoder can lead to DoS
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • OR
        • AND
          • commenttomcat-admin-webapps is earlier than 0:7.0.76-8.el7_5
            ovaloval:com.redhat.rhsa:tst:20182921001
          • commenttomcat-admin-webapps is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686002
        • AND
          • commenttomcat-jsvc is earlier than 0:7.0.76-8.el7_5
            ovaloval:com.redhat.rhsa:tst:20182921003
          • commenttomcat-jsvc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686020
        • AND
          • commenttomcat-jsp-2.2-api is earlier than 0:7.0.76-8.el7_5
            ovaloval:com.redhat.rhsa:tst:20182921005
          • commenttomcat-jsp-2.2-api is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686004
        • AND
          • commenttomcat-webapps is earlier than 0:7.0.76-8.el7_5
            ovaloval:com.redhat.rhsa:tst:20182921007
          • commenttomcat-webapps is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686010
        • AND
          • commenttomcat is earlier than 0:7.0.76-8.el7_5
            ovaloval:com.redhat.rhsa:tst:20182921009
          • commenttomcat is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686006
        • AND
          • commenttomcat-lib is earlier than 0:7.0.76-8.el7_5
            ovaloval:com.redhat.rhsa:tst:20182921011
          • commenttomcat-lib is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686012
        • AND
          • commenttomcat-javadoc is earlier than 0:7.0.76-8.el7_5
            ovaloval:com.redhat.rhsa:tst:20182921013
          • commenttomcat-javadoc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686018
        • AND
          • commenttomcat-docs-webapp is earlier than 0:7.0.76-8.el7_5
            ovaloval:com.redhat.rhsa:tst:20182921015
          • commenttomcat-docs-webapp is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686016
        • AND
          • commenttomcat-el-2.2-api is earlier than 0:7.0.76-8.el7_5
            ovaloval:com.redhat.rhsa:tst:20182921017
          • commenttomcat-el-2.2-api is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686014
        • AND
          • commenttomcat-servlet-3.0-api is earlier than 0:7.0.76-8.el7_5
            ovaloval:com.redhat.rhsa:tst:20182921019
          • commenttomcat-servlet-3.0-api is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140686008
    rhsa
    idRHSA-2018:2921
    released2018-10-16
    severityImportant
    titleRHSA-2018:2921: tomcat security update (Important)
  • rhsa
    idRHEA-2018:2188
  • rhsa
    idRHEA-2018:2189
  • rhsa
    idRHSA-2018:2700
  • rhsa
    idRHSA-2018:2701
  • rhsa
    idRHSA-2018:2740
  • rhsa
    idRHSA-2018:2741
  • rhsa
    idRHSA-2018:2742
  • rhsa
    idRHSA-2018:2743
  • rhsa
    idRHSA-2018:2930
  • rhsa
    idRHSA-2018:2939
  • rhsa
    idRHSA-2018:2945
  • rhsa
    idRHSA-2018:3768
rpms
  • jws5-0:1-5.el7jws
  • jws5-ecj-0:4.6.1-5.redhat_1.1.el7jws
  • jws5-javapackages-tools-0:3.4.1-5.15.7.el7jws
  • jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el7jws
  • jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el7jws
  • jws5-mod_cluster-tomcat-0:1.4.0-8.Final_redhat_1.1.el7jws
  • jws5-python-javapackages-0:3.4.1-5.15.7.el7jws
  • jws5-runtime-0:1-5.el7jws
  • jws5-tomcat-0:9.0.7-10.redhat_10.1.el7jws
  • jws5-tomcat-admin-webapps-0:9.0.7-10.redhat_10.1.el7jws
  • jws5-tomcat-docs-webapp-0:9.0.7-10.redhat_10.1.el7jws
  • jws5-tomcat-el-3.0-api-0:9.0.7-10.redhat_10.1.el7jws
  • jws5-tomcat-javadoc-0:9.0.7-10.redhat_10.1.el7jws
  • jws5-tomcat-jsp-2.3-api-0:9.0.7-10.redhat_10.1.el7jws
  • jws5-tomcat-jsvc-0:9.0.7-10.redhat_10.1.el7jws
  • jws5-tomcat-lib-0:9.0.7-10.redhat_10.1.el7jws
  • jws5-tomcat-native-0:1.2.17-20.redhat_20.el7jws
  • jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el7jws
  • jws5-tomcat-selinux-0:9.0.7-10.redhat_10.1.el7jws
  • jws5-tomcat-servlet-4.0-api-0:9.0.7-10.redhat_10.1.el7jws
  • jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el7jws
  • jws5-tomcat-vault-javadoc-0:1.1.7-3.Final_redhat_1.1.el7jws
  • jws5-tomcat-webapps-0:9.0.7-10.redhat_10.1.el7jws
  • jws5-0:1-5.el6jws
  • jws5-ecj-0:4.6.1-5.redhat_1.1.el6jws
  • jws5-javapackages-tools-0:3.4.1-5.15.7.el6jws
  • jws5-jboss-logging-0:3.3.1-4.Final_redhat_1.1.el6jws
  • jws5-mod_cluster-0:1.4.0-8.Final_redhat_1.1.el6jws
  • jws5-mod_cluster-tomcat-0:1.4.0-8.Final_redhat_1.1.el6jws
  • jws5-python-javapackages-0:3.4.1-5.15.7.el6jws
  • jws5-runtime-0:1-5.el6jws
  • jws5-tomcat-0:9.0.7-10.redhat_10.1.el6jws
  • jws5-tomcat-admin-webapps-0:9.0.7-10.redhat_10.1.el6jws
  • jws5-tomcat-docs-webapp-0:9.0.7-10.redhat_10.1.el6jws
  • jws5-tomcat-el-3.0-api-0:9.0.7-10.redhat_10.1.el6jws
  • jws5-tomcat-javadoc-0:9.0.7-10.redhat_10.1.el6jws
  • jws5-tomcat-jsp-2.3-api-0:9.0.7-10.redhat_10.1.el6jws
  • jws5-tomcat-jsvc-0:9.0.7-10.redhat_10.1.el6jws
  • jws5-tomcat-lib-0:9.0.7-10.redhat_10.1.el6jws
  • jws5-tomcat-native-0:1.2.17-20.redhat_20.el6jws
  • jws5-tomcat-native-debuginfo-0:1.2.17-20.redhat_20.el6jws
  • jws5-tomcat-selinux-0:9.0.7-10.redhat_10.1.el6jws
  • jws5-tomcat-servlet-4.0-api-0:9.0.7-10.redhat_10.1.el6jws
  • jws5-tomcat-vault-0:1.1.7-3.Final_redhat_1.1.el6jws
  • jws5-tomcat-vault-javadoc-0:1.1.7-3.Final_redhat_1.1.el6jws
  • jws5-tomcat-webapps-0:9.0.7-10.redhat_10.1.el6jws
  • tomcat7-0:7.0.70-29.ep7.el6
  • tomcat7-0:7.0.70-29.ep7.el7
  • tomcat7-admin-webapps-0:7.0.70-29.ep7.el6
  • tomcat7-admin-webapps-0:7.0.70-29.ep7.el7
  • tomcat7-docs-webapp-0:7.0.70-29.ep7.el6
  • tomcat7-docs-webapp-0:7.0.70-29.ep7.el7
  • tomcat7-el-2.2-api-0:7.0.70-29.ep7.el6
  • tomcat7-el-2.2-api-0:7.0.70-29.ep7.el7
  • tomcat7-javadoc-0:7.0.70-29.ep7.el6
  • tomcat7-javadoc-0:7.0.70-29.ep7.el7
  • tomcat7-jsp-2.2-api-0:7.0.70-29.ep7.el6
  • tomcat7-jsp-2.2-api-0:7.0.70-29.ep7.el7
  • tomcat7-jsvc-0:7.0.70-29.ep7.el6
  • tomcat7-jsvc-0:7.0.70-29.ep7.el7
  • tomcat7-lib-0:7.0.70-29.ep7.el6
  • tomcat7-lib-0:7.0.70-29.ep7.el7
  • tomcat7-log4j-0:7.0.70-29.ep7.el6
  • tomcat7-log4j-0:7.0.70-29.ep7.el7
  • tomcat7-selinux-0:7.0.70-29.ep7.el6
  • tomcat7-selinux-0:7.0.70-29.ep7.el7
  • tomcat7-servlet-3.0-api-0:7.0.70-29.ep7.el6
  • tomcat7-servlet-3.0-api-0:7.0.70-29.ep7.el7
  • tomcat7-webapps-0:7.0.70-29.ep7.el6
  • tomcat7-webapps-0:7.0.70-29.ep7.el7
  • tomcat8-0:8.0.36-33.ep7.el6
  • tomcat8-0:8.0.36-33.ep7.el7
  • tomcat8-admin-webapps-0:8.0.36-33.ep7.el6
  • tomcat8-admin-webapps-0:8.0.36-33.ep7.el7
  • tomcat8-docs-webapp-0:8.0.36-33.ep7.el6
  • tomcat8-docs-webapp-0:8.0.36-33.ep7.el7
  • tomcat8-el-2.2-api-0:8.0.36-33.ep7.el6
  • tomcat8-el-2.2-api-0:8.0.36-33.ep7.el7
  • tomcat8-javadoc-0:8.0.36-33.ep7.el6
  • tomcat8-javadoc-0:8.0.36-33.ep7.el7
  • tomcat8-jsp-2.3-api-0:8.0.36-33.ep7.el6
  • tomcat8-jsp-2.3-api-0:8.0.36-33.ep7.el7
  • tomcat8-jsvc-0:8.0.36-33.ep7.el6
  • tomcat8-jsvc-0:8.0.36-33.ep7.el7
  • tomcat8-lib-0:8.0.36-33.ep7.el6
  • tomcat8-lib-0:8.0.36-33.ep7.el7
  • tomcat8-log4j-0:8.0.36-33.ep7.el6
  • tomcat8-log4j-0:8.0.36-33.ep7.el7
  • tomcat8-selinux-0:8.0.36-33.ep7.el6
  • tomcat8-selinux-0:8.0.36-33.ep7.el7
  • tomcat8-servlet-3.1-api-0:8.0.36-33.ep7.el6
  • tomcat8-servlet-3.1-api-0:8.0.36-33.ep7.el7
  • tomcat8-webapps-0:8.0.36-33.ep7.el6
  • tomcat8-webapps-0:8.0.36-33.ep7.el7
  • codehaus-jackson-0:1.9.9-14.redhat_7.1.ep6.el7
  • codehaus-jackson-core-asl-0:1.9.9-14.redhat_7.1.ep6.el7
  • codehaus-jackson-jaxrs-0:1.9.9-14.redhat_7.1.ep6.el7
  • codehaus-jackson-mapper-asl-0:1.9.9-14.redhat_7.1.ep6.el7
  • codehaus-jackson-xc-0:1.9.9-14.redhat_7.1.ep6.el7
  • guava-libraries-0:13.0.1-5.redhat_3.1.ep6.el7
  • hibernate4-validator-0:4.3.4-1.Final_redhat_1.1.ep6.el7
  • hornetq-0:2.3.25-27.SP28_redhat_1.1.ep6.el7
  • ironjacamar-common-api-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • ironjacamar-common-impl-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • ironjacamar-common-spi-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • ironjacamar-core-api-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • ironjacamar-core-impl-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • ironjacamar-deployers-common-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • ironjacamar-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • ironjacamar-jdbc-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • ironjacamar-spec-api-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • ironjacamar-validator-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • jboss-as-appclient-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-cli-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-client-all-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-clustering-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-cmp-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-configadmin-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-connector-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-controller-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-controller-client-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-core-security-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-deployment-repository-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-deployment-scanner-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-domain-http-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-domain-management-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-ee-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-ee-deployment-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-ejb3-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-embedded-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-host-controller-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jacorb-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jaxr-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jaxrs-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jdr-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jmx-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jpa-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jsf-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-jsr77-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-logging-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-mail-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-management-client-content-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-messaging-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-modcluster-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-naming-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-network-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-osgi-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-osgi-configadmin-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-osgi-service-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-picketlink-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-platform-mbean-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-pojo-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-process-controller-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-protocol-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-remoting-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-sar-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-security-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-server-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-system-jmx-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-threads-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-transactions-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-version-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-web-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-webservices-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-weld-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-xts-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jboss-ejb-client-0:1.0.41-1.Final_redhat_1.1.ep6.el7
  • jboss-modules-0:1.3.11-1.Final_redhat_1.1.ep6.el7
  • jboss-vfs2-0:3.2.13-1.Final_redhat_1.1.ep6.el7
  • jboss-xnio-base-0:3.0.17-1.GA_redhat_1.1.ep6.el7
  • jbossas-appclient-0:7.5.21-2.Final_redhat_1.1.ep6.el7
  • jbossas-bundles-0:7.5.21-2.Final_redhat_1.1.ep6.el7
  • jbossas-core-0:7.5.21-2.Final_redhat_1.1.ep6.el7
  • jbossas-domain-0:7.5.21-2.Final_redhat_1.1.ep6.el7
  • jbossas-javadocs-0:7.5.21-2.Final_redhat_1.2.ep6.el7
  • jbossas-modules-eap-0:7.5.21-1.Final_redhat_1.1.ep6.el7
  • jbossas-product-eap-0:7.5.21-2.Final_redhat_1.1.ep6.el7
  • jbossas-standalone-0:7.5.21-2.Final_redhat_1.1.ep6.el7
  • jbossas-welcome-content-eap-0:7.5.21-2.Final_redhat_1.1.ep6.el7
  • jbossweb-0:7.5.29-1.Final_redhat_1.1.ep6.el7
  • picketlink-bindings-0:2.5.4-23.SP18_redhat_2.1.ep6.el7
  • picketlink-federation-0:2.5.4-21.SP18_redhat_2.1.ep6.el7
  • xerces-j2-eap6-0:2.9.1-19.redhat_8.1.ep6.el7
  • codehaus-jackson-0:1.9.9-14.redhat_7.1.ep6.el5
  • codehaus-jackson-core-asl-0:1.9.9-14.redhat_7.1.ep6.el5
  • codehaus-jackson-jaxrs-0:1.9.9-14.redhat_7.1.ep6.el5
  • codehaus-jackson-mapper-asl-0:1.9.9-14.redhat_7.1.ep6.el5
  • codehaus-jackson-xc-0:1.9.9-14.redhat_7.1.ep6.el5
  • guava-libraries-0:13.0.1-5.redhat_3.1.ep6.el5
  • hibernate4-validator-0:4.3.4-1.Final_redhat_1.1.ep6.el5
  • hornetq-0:2.3.25-27.SP28_redhat_1.1.ep6.el5
  • ironjacamar-common-api-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el5
  • ironjacamar-common-impl-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el5
  • ironjacamar-common-spi-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el5
  • ironjacamar-core-api-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el5
  • ironjacamar-core-impl-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el5
  • ironjacamar-deployers-common-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el5
  • ironjacamar-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el5
  • ironjacamar-jdbc-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el5
  • ironjacamar-spec-api-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el5
  • ironjacamar-validator-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el5
  • jboss-as-appclient-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-cli-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-client-all-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-clustering-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-cmp-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-configadmin-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-connector-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-controller-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-controller-client-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-core-security-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-deployment-repository-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-deployment-scanner-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-domain-http-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-domain-management-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-ee-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-ee-deployment-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-ejb3-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-embedded-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-host-controller-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jacorb-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jaxr-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jaxrs-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jdr-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jmx-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jpa-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jsf-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-jsr77-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-logging-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-mail-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-management-client-content-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-messaging-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-modcluster-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-naming-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-network-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-osgi-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-osgi-configadmin-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-osgi-service-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-picketlink-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-platform-mbean-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-pojo-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-process-controller-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-protocol-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-remoting-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-sar-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-security-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-server-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-system-jmx-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-threads-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-transactions-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-version-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-web-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-webservices-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-weld-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-xts-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jboss-ejb-client-0:1.0.41-1.Final_redhat_1.1.ep6.el5
  • jboss-modules-0:1.3.11-1.Final_redhat_1.1.ep6.el5
  • jboss-vfs2-0:3.2.13-1.Final_redhat_1.1.ep6.el5
  • jboss-xnio-base-0:3.0.17-1.GA_redhat_1.1.ep6.el5
  • jbossas-appclient-0:7.5.21-2.Final_redhat_1.1.ep6.el5
  • jbossas-bundles-0:7.5.21-2.Final_redhat_1.1.ep6.el5
  • jbossas-core-0:7.5.21-2.Final_redhat_1.1.ep6.el5
  • jbossas-domain-0:7.5.21-2.Final_redhat_1.1.ep6.el5
  • jbossas-javadocs-0:7.5.21-2.Final_redhat_1.2.ep6.el5
  • jbossas-modules-eap-0:7.5.21-1.Final_redhat_1.1.ep6.el5
  • jbossas-product-eap-0:7.5.21-2.Final_redhat_1.1.ep6.el5
  • jbossas-standalone-0:7.5.21-2.Final_redhat_1.1.ep6.el5
  • jbossas-welcome-content-eap-0:7.5.21-2.Final_redhat_1.1.ep6.el5
  • jbossweb-0:7.5.29-1.Final_redhat_1.1.ep6.el5
  • picketlink-bindings-0:2.5.4-23.SP18_redhat_2.1.ep6.el5
  • picketlink-federation-0:2.5.4-21.SP18_redhat_2.1.ep6.el5
  • xerces-j2-eap6-0:2.9.1-19.redhat_8.1.ep6.el5
  • codehaus-jackson-0:1.9.9-14.redhat_7.1.ep6.el6
  • codehaus-jackson-core-asl-0:1.9.9-14.redhat_7.1.ep6.el6
  • codehaus-jackson-jaxrs-0:1.9.9-14.redhat_7.1.ep6.el6
  • codehaus-jackson-mapper-asl-0:1.9.9-14.redhat_7.1.ep6.el6
  • codehaus-jackson-xc-0:1.9.9-14.redhat_7.1.ep6.el6
  • guava-libraries-0:13.0.1-5.redhat_3.1.ep6.el6
  • hibernate4-validator-0:4.3.4-1.Final_redhat_1.1.ep6.el6
  • hornetq-0:2.3.25-27.SP28_redhat_1.1.ep6.el6
  • ironjacamar-common-api-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el6
  • ironjacamar-common-impl-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el6
  • ironjacamar-common-spi-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el6
  • ironjacamar-core-api-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el6
  • ironjacamar-core-impl-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el6
  • ironjacamar-deployers-common-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el6
  • ironjacamar-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el6
  • ironjacamar-jdbc-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el6
  • ironjacamar-spec-api-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el6
  • ironjacamar-validator-eap6-0:1.0.42-2.Final_redhat_2.1.ep6.el6
  • jboss-as-appclient-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-cli-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-client-all-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-clustering-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-cmp-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-configadmin-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-connector-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-controller-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-controller-client-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-core-security-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-deployment-repository-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-deployment-scanner-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-domain-http-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-domain-management-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-ee-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-ee-deployment-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-ejb3-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-embedded-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-host-controller-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jacorb-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jaxr-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jaxrs-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jdr-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jmx-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jpa-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jsf-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-jsr77-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-logging-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-mail-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-management-client-content-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-messaging-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-modcluster-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-naming-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-network-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-osgi-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-osgi-configadmin-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-osgi-service-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-picketlink-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-platform-mbean-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-pojo-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-process-controller-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-protocol-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-remoting-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-sar-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-security-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-server-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-system-jmx-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-threads-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-transactions-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-version-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-web-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-webservices-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-weld-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-xts-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jboss-ejb-client-0:1.0.41-1.Final_redhat_1.1.ep6.el6
  • jboss-modules-0:1.3.11-1.Final_redhat_1.1.ep6.el6
  • jboss-vfs2-0:3.2.13-1.Final_redhat_1.1.ep6.el6
  • jboss-xnio-base-0:3.0.17-1.GA_redhat_1.1.ep6.el6
  • jbossas-appclient-0:7.5.21-2.Final_redhat_1.1.ep6.el6
  • jbossas-bundles-0:7.5.21-2.Final_redhat_1.1.ep6.el6
  • jbossas-core-0:7.5.21-2.Final_redhat_1.1.ep6.el6
  • jbossas-domain-0:7.5.21-2.Final_redhat_1.1.ep6.el6
  • jbossas-javadocs-0:7.5.21-2.Final_redhat_1.2.ep6.el6
  • jbossas-modules-eap-0:7.5.21-1.Final_redhat_1.1.ep6.el6
  • jbossas-product-eap-0:7.5.21-2.Final_redhat_1.1.ep6.el6
  • jbossas-standalone-0:7.5.21-2.Final_redhat_1.1.ep6.el6
  • jbossas-welcome-content-eap-0:7.5.21-2.Final_redhat_1.1.ep6.el6
  • jbossweb-0:7.5.29-1.Final_redhat_1.1.ep6.el6
  • picketlink-bindings-0:2.5.4-23.SP18_redhat_2.1.ep6.el6
  • picketlink-federation-0:2.5.4-21.SP18_redhat_2.1.ep6.el6
  • xerces-j2-eap6-0:2.9.1-19.redhat_8.1.ep6.el6
  • tomcat-0:7.0.76-8.el7_5
  • tomcat-admin-webapps-0:7.0.76-8.el7_5
  • tomcat-docs-webapp-0:7.0.76-8.el7_5
  • tomcat-el-2.2-api-0:7.0.76-8.el7_5
  • tomcat-javadoc-0:7.0.76-8.el7_5
  • tomcat-jsp-2.2-api-0:7.0.76-8.el7_5
  • tomcat-jsvc-0:7.0.76-8.el7_5
  • tomcat-lib-0:7.0.76-8.el7_5
  • tomcat-servlet-3.0-api-0:7.0.76-8.el7_5
  • tomcat-webapps-0:7.0.76-8.el7_5

The Hacker News

idTHN:D761F7EF41472ED13C52BD3AF1E1F9BA
last seen2018-07-24
modified2018-07-24
published2018-07-24
reporterThe Hacker News
sourcehttps://thehackernews.com/2018/07/apache-tomcat-server.html
titleApache Tomcat Patches Important Security Vulnerabilities

References