Apache Tomcat 6.x < 6.0.35 Multiple Vulnerabilities

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote web server is affected by multiple vulnerabilities.

Description :

According to its self-reported version number, the instance of Apache
Tomcat 6.x listening on the remote host is prior to 6.0.35. It is,
therefore, affected by multiple vulnerabilities :

- Specially crafted requests are incorrectly processed
by Tomcat and can cause the server to allow injection
of arbitrary AJP messages. This can lead to
authentication bypass and disclosure of sensitive
information. (CVE-2011-3190)

- An information disclosure vulnerability exists. Request
information is cached in two objects and these objects
are not recycled at the same time. Further requests can
obtain sensitive information if certain error conditions
occur. (CVE-2011-3375)

- Large numbers of crafted form parameters can cause
excessive CPU consumption due to hash collisions.
(CVE-2011-4858, CVE-2012-0022)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

https://issues.apache.org/bugzilla/show_bug.cgi?id=51698#c2
http://svn.apache.org/viewvc?view=revision&revision=1162959
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.35
http://www.nruns.com/_downloads/advisory28122011.pdf

Solution :

Upgrade to Apache Tomcat version 6.0.35 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 57080 ()

Bugtraq ID: 49353
51200
51442
51447

CVE ID: CVE-2011-3190
CVE-2011-3375
CVE-2011-4858
CVE-2012-0022

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial