Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jpqr-vh55-xqxf

Опубликовано: 01 мая 2022
Источник: github
Github: Прошло ревью

Описание

Apache Tomcat Buffer Over-Read

The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the ajp_process_callback in mod_jk, which allows remote attackers to read portions of sensitive memory.

Ссылки

Пакеты

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

<= 5.5.15

Отсутствует

EPSS

Процентиль: 84%
0.02327
Низкий

Дефекты

CWE-126

Связанные уязвимости

ubuntu
около 18 лет назад

The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the ajp_process_callback in mod_jk, which allows remote attackers to read portions of sensitive memory.

redhat
больше 19 лет назад

The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the ajp_process_callback in mod_jk, which allows remote attackers to read portions of sensitive memory.

nvd
около 18 лет назад

The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the ajp_process_callback in mod_jk, which allows remote attackers to read portions of sensitive memory.

debian
около 18 лет назад

The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for ...

EPSS

Процентиль: 84%
0.02327
Низкий

Дефекты

CWE-126