[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-2526

Date: (C)2011-07-14   (M)2017-09-22
 
CVSS Score: 4.4Access Vector: LOCAL
Exploitability Subscore: 3.4Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.

Reference:
SECTRACK-1025788
http://www.securityfocus.com/archive/1/archive/1/518889/100/0/threaded
SECUNIA-45232
BID-48667
OSVDB-73797
OSVDB-73798
DSA-2401
HPSBST02955
HPSBUX02725
HPSBUX02860
MDVSA-2011:156
RHSA-2012:0074
RHSA-2012:0075
RHSA-2012:0076
RHSA-2012:0077
RHSA-2012:0078
RHSA-2012:0325
SSRT100627
SSRT100825
SSRT101146
http://svn.apache.org/viewvc?view=revision&revision=1145383
http://svn.apache.org/viewvc?view=revision&revision=1145571
http://svn.apache.org/viewvc?view=revision&revision=1145694
http://svn.apache.org/viewvc?view=revision&revision=1146005
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
https://bugzilla.redhat.com/show_bug.cgi?id=720948
tomcat-sendfile-info-disclosure(68541)

CPE    80
cpe:/a:apache:tomcat:5.5.28
cpe:/a:apache:tomcat:5.5.29
cpe:/a:apache:tomcat:5.5.30
cpe:/a:apache:tomcat:5.5.32
...
CWE    1
CWE-20
OVAL    10
oval:org.secpod.oval:def:103005
oval:org.secpod.oval:def:1556
oval:org.secpod.oval:def:700683
oval:org.secpod.oval:def:1000117
...

© 2013 SecPod Technologies