[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-3271Date: (C)2008-10-13   (M)2023-12-22


Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
SECTRACK-1021039
http://www.securityfocus.com/archive/1/497220/100/0/threaded
BID-31698
SECUNIA-32213
SECUNIA-32234
SECUNIA-32398
SECUNIA-35684
SREASON-4396
ADV-2008-2793
ADV-2008-2800
ADV-2009-1818
JVN#30732239
JVNDB-2008-000069
SUSE-SR:2008:023
apache-tomcat-valve-security-bypass(45791)
http://tomcat.apache.org/security-4.html
http://tomcat.apache.org/security-5.html
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200806e.html
http://www.nec.co.jp/security-info/secinfo/nv09-006.html
https://issues.apache.org/bugzilla/show_bug.cgi?id=25835
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E

CWE    1
CWE-264
OVAL    1
oval:org.secpod.oval:def:20821

© SecPod Technologies