SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |   



Category:   Application (Web Server/CGI)  >   Red Hat JBoss Vendors:   Red Hat
(Red Hat Issues Fix for Red Hat JBoss) Apache Tomcat NIO/NIO2 Connector Management Flaw Lets Remote Users Access Other User's Sessions in Certain Cases
SecurityTracker Alert ID:  1041796
SecurityTracker URL:  https://securitytracker.com/id/1041796
CVE Reference:   CVE-2018-8037   (Links to External Site)
Date:  Oct 3 2018
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Apache Tomcat. A remote user can access other user sessions. Red Hat JBoss is affected.

A remote user can exploit a flaw in the tracking of connection closures in NIO/NIO2 connectors to establish a new connection that re-uses an existing user session.

Dmitry Treskunov reported this vulnerability.

Impact:   A remote user can access another user's session.
Solution:   Red Hat has issued a fix for Red Hat JBoss.

The Red Hat advisory is available at:

https://access.redhat.com/errata/RHSA-2018:2867

Vendor URL:  access.redhat.com/errata/RHSA-2018:2867 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Red Hat Enterprise)

Message History:   This archive entry is a follow-up to the message listed below.
Jul 26 2018 Apache Tomcat NIO/NIO2 Connector Management Flaw Lets Remote Users Access Other User's Sessions in Certain Cases



 Source Message Contents

Subject:  [RHSA-2018:2867-01] Important: Red Hat JBoss Web Server 5.0 Service Pack 1 security and bug fix update


[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search


Content previously copyright SecurityGlobal.net LLC placed in the public domain on December 31, 2019.