Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0033

Опубликовано: 05 июн. 2009
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5

Описание

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

DNE

natty

DNE

oneiric

DNE

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

DNE

lucid

DNE

maverick

DNE

natty

DNE

oneiric

DNE

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

6.0.20-1ubuntu1
hardy

DNE

intrepid

released

6.0.18-0ubuntu3.2
jaunty

released

6.0.18-0ubuntu6.1
karmic

not-affected

6.0.20-1ubuntu1
lucid

not-affected

6.0.20-1ubuntu1
maverick

not-affected

6.0.20-1ubuntu1
natty

not-affected

6.0.20-1ubuntu1
oneiric

not-affected

6.0.20-1ubuntu1

Показывать по

EPSS

Процентиль: 97%
0.32437
Средний

5 Medium

CVSS2

Связанные уязвимости

redhat
около 16 лет назад

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.

nvd
около 16 лет назад

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.

debian
около 16 лет назад

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 th ...

github
около 3 лет назад

Apache Tomcat Denial of Service via Malformed Request Headers

oracle-oval
почти 16 лет назад

ELSA-2009-1164: tomcat security update (IMPORTANT)

EPSS

Процентиль: 97%
0.32437
Средний

5 Medium

CVSS2