- 漏洞ID:1123512
- 漏洞类型:输入验证
- 发布日期:2016-10-03
- 更新时间:2017-05-23
- CVE编号:CVE-2016-1240
- CNNVD-ID:CNNVD-201609-410
- 漏洞平台:Linux
- CVSS评分:7.2
<a href="https://www.exploit-db.com/exploits/40450" target="_blank">https://www.exploit-db.com/exploits/40450</a><br/> <a href="https://www.securityfocus.com/bid/93263" target="_blank">https://www.securityfocus.com/bid/93263</a><br/> <a href="http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201609-410" target="_blank">http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201609-410</a><br/>
ApacheTomcat是美国阿帕奇(Apache)软件基金会下属的Jakarta项目的一款轻量级Web应用服务器,它主要用于开发和调试JSP程序,适用于中小型系统。ApacheTomcat启动脚本存在安全漏洞。具有Tomcat账户访问权限本地攻击者可通过对Catalina日志文件实施符号链接攻击利用该漏洞获取root权限。以下产品和版本受到影响:ApacheTomcat6.0,7.0,8.0,DebianLinux8.0,UbuntuLinux16.04,14.04,12.04。
来源:legalhackers.com
链接:http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.html
来源:DEBIAN
链接:http://www.debian.org/security/2016/dsa-3670
来源:SECTRACK
链接:http://www.securitytracker.com/id/1036845
来源:UBUNTU
链接:http://www.ubuntu.com/usn/USN-3081-1
来源:DEBIAN
链接:http://www.debian.org/security/2016/dsa-3669
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/archive/1/539519/100/0/threaded
来源:www.auscert.org.au
链接:http://www.auscert.org.au/./render.html?it=38650
来源:packetstormsecurity.com
链接:http://packetstormsecurity.com/files/138767/Ubuntu-Security-Notice-USN-3081-1.html
来源:packetstormsecurity.com
链接:http://packetstormsecurity.com/files/138747/Debian-Security-Advisory-3669-1.html