CVE-2009-0033

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.

References

http://jvn.jp/en/jp/JVN87272440/index.html

http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html

http://marc.info/?l=bugtraq&m=127420533226623&w=2

http://marc.info/?l=bugtraq&m=129070310906557&w=2

http://marc.info/?l=bugtraq&m=133469267822771&w=2

http://marc.info/?l=bugtraq&m=136485229118404&w=2

http://secunia.com/advisories/35326

http://secunia.com/advisories/35344

http://secunia.com/advisories/35685

http://secunia.com/advisories/35788

http://secunia.com/advisories/37460

http://secunia.com/advisories/42368

http://securitytracker.com/id?1022331

http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1

http://support.apple.com/kb/HT4077

http://svn.apache.org/viewvc?rev=742915&view=rev

http://svn.apache.org/viewvc?rev=781362&view=rev

http://tomcat.apache.org/security-4.html

http://tomcat.apache.org/security-5.html

http://tomcat.apache.org/security-6.html

http://www.debian.org/security/2011/dsa-2207

http://www.mandriva.com/security/advisories?name=MDVSA-2009:136

http://www.mandriva.com/security/advisories?name=MDVSA-2009:138

http://www.mandriva.com/security/advisories?name=MDVSA-2010:176

http://www.securityfocus.com/archive/1/504044/100/0/threaded

http://www.securityfocus.com/archive/1/507985/100/0/threaded

http://www.securityfocus.com/bid/35193

http://www.vmware.com/security/advisories/VMSA-2009-0016.html

http://www.vupen.com/english/advisories/2009/1496

http://www.vupen.com/english/advisories/2009/1856

http://www.vupen.com/english/advisories/2009/3316

http://www.vupen.com/english/advisories/2010/3056

https://exchange.xforce.ibmcloud.com/vulnerabilities/50928

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739

https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html

https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html

https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html

Details

Source: MITRE

Published: 2009-06-05

Updated: 2019-03-25

Type: CWE-20

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.38:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.39:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*

Tenable Plugins

View all (28 total)

IDNameProductFamilySeverity
89117VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2009-0016) (remote check)NessusMisc.
critical
67895Oracle Linux 5 : tomcat (ELSA-2009-1164)NessusOracle Linux Local Security Checks
medium
60621Scientific Linux Security Update : tomcat on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
59677GLSA-201206-24 : Apache Tomcat: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
53212Debian DSA-2207-1 : tomcat5.5 - several vulnerabilitiesNessusDebian Local Security Checks
medium
49206Mandriva Linux Security Advisory : tomcat5 (MDVSA-2010:176)NessusMandriva Local Security Checks
medium
46753Apache Tomcat < 4.1.40 / 5.5.28 / 6.0.20 Multiple VulnerabilitiesNessusWeb Servers
medium
5489Mac OS X < 10.6.3 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
45373Mac OS X Multiple Vulnerabilities (Security Update 2010-002)NessusMacOS X Local Security Checks
critical
45372Mac OS X 10.6.x < 10.6.3 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
43845RHEL 4 : tomcat in Satellite Server (RHSA-2009:1617)NessusRed Hat Local Security Checks
medium
43844RHEL 4 : tomcat in Satellite Server (RHSA-2009:1616)NessusRed Hat Local Security Checks
medium
43770CentOS 5 : tomcat (CESA-2009:1164)NessusCentOS Local Security Checks
medium
42903Fedora 11 : tomcat6-6.0.20-1.fc11 (2009-11374)NessusFedora Local Security Checks
medium
42902Fedora 10 : tomcat6-6.0.20-1.fc10 (2009-11356)NessusFedora Local Security Checks
medium
42901Fedora 12 : tomcat6-6.0.20-1.fc12 (2009-11352)NessusFedora Local Security Checks
medium
42870VMSA-2009-0016 : VMware vCenter and ESX update release and vMA patch release address multiple security issues in third party components.NessusVMware ESX Local Security Checks
medium
42037openSUSE 10 Security Update : tomcat55 (tomcat55-6369)NessusSuSE Local Security Checks
medium
41592SuSE 10 Security Update : Tomcat 5 (ZYPP Patch Number 6352)NessusSuSE Local Security Checks
medium
41314SuSE9 Security Update : Tomcat (YOU Patch Number 12460)NessusSuSE Local Security Checks
medium
40342RHEL 5 : tomcat (RHSA-2009:1164)NessusRed Hat Local Security Checks
medium
40316openSUSE Security Update : tomcat6 (tomcat6-999)NessusSuSE Local Security Checks
medium
40144openSUSE Security Update : tomcat6 (tomcat6-999)NessusSuSE Local Security Checks
medium
39486Mandriva Linux Security Advisory : tomcat5 (MDVSA-2009:138)NessusMandriva Local Security Checks
medium
39485Mandriva Linux Security Advisory : tomcat5 (MDVSA-2009:136)NessusMandriva Local Security Checks
medium
39419Ubuntu 8.10 / 9.04 : tomcat6 vulnerabilities (USN-788-1)NessusUbuntu Local Security Checks
medium
5044Apache Tomcat 4.1.x < 4.1.40 / 5.5.x < 5.5.28 / 6.0.x < 6.0.20 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
medium
800598Apache Tomcat < 4.1.40 / 5.5.28 / 6.0.20 Multiple VulnerabilitiesLog Correlation EngineWeb Servers
medium