Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
This is an advisory on security updates released by The Apache Software Foundation to address vulnerabilities in Apache Tomcat.
The Apache Software Foundation has recently released updates to patch the vulnerabilities found in some versions of the Apache Tomcat. These vulnerabilities can be exploited to obtain sensitive information.
The Apache Software Foundation has discovered two vulnerabilities in the Apache Tomcat software. CVE-2018-1336 Apache Tomcat – Denial of Service vulnerability, and CVE-2018-8037 Apache Tomcat – Information Disclosure vulnerability, were found on July 22nd, that have been patched by the Apache Software Foundation the following day.
The addressed vulnerabilities were found in the Apache Tomcat versions 9.0.0.M9 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86.
CVE-2018-1336 is an Apache Tomcat Denial of Service vulnerability. Tomcat uses the UTF-8 decoder of the late Apache Harmony project, that decoder has a not supported edge case (aka Bug), which can lead to an infinite loop while trying to decode UTF-8 encoded characters, when an overflow in the UTF-8 décor is mishandled. Thus, the infinite loop leads to Denial of Service (DoS).
CVE-2018-8037 is an Apache Tomcat Information Disclosure vulnerability. It occurs due to a bug in the tracking of connection closures, that can lead to reuse of user sessions in a new connection. It seems that the researchers are not yet entirely clear on what factor triggered this potentially grave vulnerability of mixed up user sessions in the NIO and NIO2 connectors. According to the reporter it was accompanied by several exceptions happening in the same time frame.
Updates for CVE-2018-8037:
Affected version | Upgrade to |
Apache Tomcat 9.0.0.M9 to 9.0.9 | Apache Tomcat 9.0.10 or later. |
Apache Tomcat 8.5.5 to 8.5.31 | Apache Tomcat 8.5.32 or later. |
Updates for CVE-2018-1336:
Affected version | Upgrade to |
Apache Tomcat 9.0.0.M9 to 9.0.7 | Apache Tomcat 9.0.7 or later |
Apache Tomcat 8.5.0 to 8.5.30 | Apache Tomcat 8.5.32 or later |
Apache Tomcat 8.0.0.RC1 to 8.0.51 | Apache Tomcat 8.0.52 or later |
Apache Tomcat 7.0.28 to 7.0.86 | Apache Tomcat 7.0.90 or later |
To stay safe from known vulnerabilities, we advise you to update your Tomcat installations each time a new Tomcat patch release is announced.
If you think you are a victim of a cyber-security attack. Immediately send an email to info@rewterz.com for a rapid response.