Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-7197

Опубликовано: 25 апр. 2007
Источник: debian
EPSS Низкий

Описание

The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the ajp_process_callback in mod_jk, which allows remote attackers to read portions of sensitive memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat5.5fixed5.5.17-1package

EPSS

Процентиль: 84%
0.02327
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the ajp_process_callback in mod_jk, which allows remote attackers to read portions of sensitive memory.

redhat
больше 19 лет назад

The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the ajp_process_callback in mod_jk, which allows remote attackers to read portions of sensitive memory.

nvd
около 18 лет назад

The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the ajp_process_callback in mod_jk, which allows remote attackers to read portions of sensitive memory.

github
около 3 лет назад

Apache Tomcat Buffer Over-Read

EPSS

Процентиль: 84%
0.02327
Низкий