[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2017-0527 -- Oracle tomcat6

ID: oval:org.secpod.oval:def:1501797Date: (C)2017-03-22   (M)2023-12-20
Class: PATCHFamily: unix




CVE-2016-6816 : The code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. CVE-2016-8745 : A bug in the error handling of the send file code for the NIO HTTP connector resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, but not limited to, session ID and the response body.

Platform:
Oracle Linux 6
Product:
tomcat6
Reference:
ELSA-2017-0527
CVE-2016-6816
CVE-2016-8745
CVE    2
CVE-2016-6816
CVE-2016-8745
CPE    2
cpe:/o:oracle:linux:6
cpe:/a:apache:tomcat6

© SecPod Technologies