SUSE: 2020:1497-1 important: tomcat
Summary
This update for tomcat fixes the following issues: CVE-2020-9484 (bsc#1171928) Apache Tomcat Remote Code Execution via session persistence If an attacker was able to control the contents and name of a file on a server configured to use the PersistenceManager, then the attacker could have triggered a remote code execution via deserialization of the file under their control. CVE-2019-12418 (bsc#1159723) Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance. CVE-2019-0221 (bsc...
Read the Full AdvisoryReferences
#1136085 #1159723 #1159729 #1164825 #1171928
Cross- CVE-2019-0221 CVE-2019-12418 CVE-2019-17563
CVE-2019-17569 CVE-2020-9484
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
https://www.suse.com/security/cve/CVE-2019-0221.html
https://www.suse.com/security/cve/CVE-2019-12418.html
https://www.suse.com/security/cve/CVE-2019-17563.html
https://www.suse.com/security/cve/CVE-2019-17569.html
https://www.suse.com/security/cve/CVE-2020-9484.html
https://bugzilla.suse.com/1136085
https://bugzilla.suse.com/1159723
https://bugzilla.suse.com/1159729
https://bugzilla.suse.com/1164825
https://bugzilla.suse.com/1171928