This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote Apache Tomcat server is affected by multiple
According to its self-reported version number, the Apache Tomcat
server running on the remote host is 8.0.x prior to 8.0.11. It is,
therefore, affected by multiple vulnerabilities in the bundled version
of OpenSSL :
- An error exists in the function 'ssl3_read_bytes' that
could allow data to be injected into other sessions or
allow denial of service attacks. Note that this issue
is exploitable only if 'SSL_MODE_RELEASE_BUFFERS' is
- A buffer overflow error exists related to invalid DTLS
fragment handling that could lead to the execution of
arbitrary code. Note that this issue only affects
OpenSSL when used as a DTLS client or server.
- An error exists in the function 'do_ssl3_write' that
could allow a NULL pointer to be dereferenced leading to
denial of service attacks. Note that this issue is
exploitable only if 'SSL_MODE_RELEASE_BUFFERS' is
- An error exists related to DTLS handshake handling that
could lead to denial of service attacks. Note that this
issue only affects OpenSSL when used as a DTLS client.
- An unspecified error exists that could allow an attacker
to cause usage of weak keying material leading to
simplified man-in-the-middle attacks. (CVE-2014-0224)
- An unspecified error exists related to anonymous ECDH
cipher suites that could allow denial of service
attacks. Note that this issue only affects OpenSSL TLS
Note that Nessus has not attempted to exploit these issues but has
instead relied only on the application's self-reported version number.
See also :
Update to Apache Tomcat version 8.0.11 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 77476 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now