CVE-2007-6286

MEDIUM

Description

Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as demonstrated by using netcat to send the empty request.

References

http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html

http://marc.info/?l=bugtraq&m=139344343412337&w=2

http://secunia.com/advisories/28878

http://secunia.com/advisories/28915

http://secunia.com/advisories/29711

http://secunia.com/advisories/30676

http://secunia.com/advisories/32222

http://secunia.com/advisories/37460

http://secunia.com/advisories/57126

http://security.gentoo.org/glsa/glsa-200804-10.xml

http://securityreason.com/securityalert/3637

http://support.apple.com/kb/HT3216

http://tomcat.apache.org/security-5.html

http://tomcat.apache.org/security-6.html

http://www.mandriva.com/security/advisories?name=MDVSA-2009:136

http://www.securityfocus.com/archive/1/487823/100/0/threaded

http://www.securityfocus.com/archive/1/507985/100/0/threaded

http://www.securityfocus.com/bid/31681

http://www.vmware.com/security/advisories/VMSA-2008-0010.html

http://www.vmware.com/security/advisories/VMSA-2009-0016.html

http://www.vupen.com/english/advisories/2008/0488

http://www.vupen.com/english/advisories/2008/1856/references

http://www.vupen.com/english/advisories/2008/2780

http://www.vupen.com/english/advisories/2009/3316

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html

https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html

Details

Source: MITRE

Published: 2008-02-12

Updated: 2019-03-25

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Tenable Plugins

View all (12 total)

IDNameProductFamilySeverity
89117VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2009-0016) (remote check)NessusMisc.
critical
47577Apache Tomcat < 6.0.16 Multiple VulnerabilitiesNessusWeb Servers
medium
47576Apache Tomcat < 5.5.26 Multiple VulnerabilitiesNessusWeb Servers
medium
42870VMSA-2009-0016 : VMware vCenter and ESX update release and vMA patch release address multiple security issues in third party components.NessusVMware ESX Local Security Checks
critical
41596SuSE 10 Security Update : Websphere Community Edition (ZYPP Patch Number 5850)NessusSuSE Local Security Checks
high
40379VMSA-2008-0010 : Updated Tomcat and Java JRE packages for VMware ESX 3.5 and VirtualCenterNessusVMware ESX Local Security Checks
critical
40371VMSA-2008-00010 : Updated Tomcat and Java JRE packages for VMware, ESX 3.5 and VirtualCenter 2.5 (DEPRECATED)NessusVMware ESX Local Security Checks
critical
39485Mandriva Linux Security Advisory : tomcat5 (MDVSA-2009:136)NessusMandriva Local Security Checks
medium
34374Mac OS X Multiple Vulnerabilities (Security Update 2008-007)NessusMacOS X Local Security Checks
critical
31957GLSA-200804-10 : Tomcat: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
31074Fedora 8 : tomcat5-5.5.26-1jpp.2.fc8 (2008-1603)NessusFedora Local Security Checks
medium
31062Fedora 7 : tomcat5-5.5.26-1jpp.2.fc7 (2008-1467)NessusFedora Local Security Checks
medium