Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-8037

Опубликовано: 02 авг. 2018
Источник: debian
EPSS Низкий

Описание

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat9not-affectedpackage
tomcat8fixed8.5.32-1package
tomcat8not-affectedjessiepackage
tomcat8.0not-affectedpackage

Примечания

  • https://svn.apache.org/r1833906 (9.0.x)

  • https://svn.apache.org/r1833907 (8.5.x)

EPSS

Процентиль: 89%
0.05055
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 7 лет назад

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 9.1
redhat
почти 7 лет назад

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 5.9
nvd
почти 7 лет назад

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 5.9
github
больше 6 лет назад

Apache Tomcat Race Condition vulnerability

CVSS3: 5.9
fstec
почти 7 лет назад

Уязвимость сервера приложений Apache Tomcat, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 89%
0.05055
Низкий