Описание
Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | tomcat6 | Not affected | ||
Red Hat JBoss Enterprise Web Server 1 for RHEL 5 | tomcat6 | Fixed | RHSA-2012:0682 | 21.05.2012 |
Red Hat JBoss Enterprise Web Server 1 for RHEL 6 | tomcat6 | Fixed | RHSA-2012:0682 | 21.05.2012 |
Red Hat JBoss Web Server 1.0 | Fixed | RHSA-2012:0681 | 21.05.2012 |
Показывать по
Дополнительная информация
Статус:
4 Medium
CVSS2
Связанные уязвимости
Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data.
Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data.
Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not pro ...
Apache Tomcat Exposes IP Addresses and HTTP Headers of Requests
4 Medium
CVSS2