Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-6286

Опубликовано: 08 фев. 2008
Источник: redhat
EPSS Низкий

Описание

Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as demonstrated by using netcat to send the empty request.

Отчет

Not Vulnerable. Red Hat does not ship a version of Apache Tomcat that enables the native APR connector.

Дополнительная информация

Статус:

Important

EPSS

Процентиль: 93%
0.09459
Низкий

Связанные уязвимости

ubuntu
почти 18 лет назад

Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as demonstrated by using netcat to send the empty request.

nvd
почти 18 лет назад

Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as demonstrated by using netcat to send the empty request.

debian
почти 18 лет назад

Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the ...

github
почти 4 года назад

Apache Tomcat Does Not Properly Handle Empty Requests

EPSS

Процентиль: 93%
0.09459
Низкий