
(CVE-2014-0227) - An error exists due to a failure to limit the size of discarded requests. This allows a remote attacker, via streaming data with malformed chunked transfer coding, to conduct HTTP request smuggling or cause a denial of service. (CVE-2014-0224) - An error exists in 'ChunkedInputFilter.java' due to improper handling of attempts to continue reading data after an error has occurred. (CVE-2014-0221) - An unspecified error exists in how ChangeCipherSpec messages are processed that can allow an attacker to cause usage of weak keying material, leading to simplified man-in-the-middle attacks. Note that this issue only affects OpenSSL when used as a DTLS client. (CVE-2014-0198) - An error exists related to DTLS handshake handling that can lead to denial of service attacks. Note that this issue is exploitable only if 'SSL_MODE_RELEASE_BUFFERS' is enabled. (CVE-2014-0195) - An error exists in the do_ssl3_write() function that allows a NULL pointer to be dereferenced, resulting in a denial of service. Note that this issue only affects OpenSSL when used as a DTLS client or server. (CVE-2010-5298) - A buffer overflow error exists related to invalid DTLS fragment handling that can lead to the execution of arbitrary code. This allows a remote attacker to inject data across sessions or cause a denial of service. It is, therefore, affected by the following vulnerabilities : - A race condition exists in the ssl3_read_bytes() function when SSL_MODE_RELEASE_BUFFERS is enabled. Description According to its self-reported version number, the Apache Tomcat service listening on the remote host is 7.0.x prior to 7.0.55.
#Apache tomcat 7.0.55 download upgrade#
Upgrade Apache Tomcat in CA Service Desk Manager (CA SDM) 14.Synopsis The remote Apache Tomcat server is affected by multiple vulnerabilities. Tomcat not running properly after upgrading to Tomcat. NOTE: Similar to Visualizer, if Federated Search or REST Tomcats are installed, then appropriate changes could be performed similar to the approaches suggested above Visualizer Tomcat.ġ6. Note: If this step is not performed then the applications will not deploy properly when Tomcat is started. Modify config.properties located in directory NX_ROOT\site as follows:
#Apache tomcat 7.0.55 download install#
Modify NX.ENV located at the CA SDM install directory (NX_ROOT) as Files\CA\SC\tomcat\7.0.55.Make a backup copy of the NX.ENV located at the CA SDM install directory (NX_ROOT).:\\CA\SC\tomcat\7.0.55 should NOT contain :\\CA\SC\tomcat\7.0.55\apache-tomcat-7.0.55 which means the unzipping was done improperly. Note: After unzipping, ensure that :\\CA\SC\tomcat\7.0.55 contains conf, bin, webapps and other directories. Unzip apache-tomcat-7.0.55.zip and place files in to :\\CA\SC\tomcat\7.0.55.

If the resolution to the problem is determined to be outside the realm of their support responsibilities, they may ask that you escalate your request for certification to your local account team. Both Technical Support and Sustaining Engineering will do their best to resolve any issues that occur in a timely manner. CA reserves the right to refuse support of new point releases should the reported problem require a major SDM rework or redesign in order to function properly. Note: CA SDM will support service packs and point releases of Operating Systems, Databases, Web Servers, Web Browsers, Java, Servlets, etc., not necessarily noted on the certification matrix as long as the problem reported is reproducible with versions that are listed on the matrix. Shut down the CA Service Desk Daemon Service and/or Service Desk Proctor Service on the relevant Service Desk Server (primary and/or secondary).

All Apache Tomcat 7.0.xx downloads can be located at Instructions Note: Although this document explicitly indicates Apache Tomcat 7.0.55, the same steps can be followed for any Apache Tomcat 7.0.xx version. This document will provide steps to upgrade the out-of-the-box Apache Tomcat version of CA SDM 12.9 to Apache Tomcat 7.0.55. CA Service Desk Manager (CA SDM) 12.9 provides out-of-the-box Apache Tomcat 7.0.23.
