Apache Tomcat AJP12 Protocol Malformed Packet Remote DoS

Medium Nessus Plugin ID 17322


The remote AJP connector is affected by a denial of service vulnerability.


According to its banner, the version of Apache Tomcat running on the remote host is affected by a denial of service vulnerability due to a failure to handle malformed input. By submitting a specially crafted AJP12 request, an unauthenticated attacker can cause Tomcat to stop responding. At present, details on the specific nature of such requests are not generally known.


Upgrade to Apache Tomcat version 5.x or later.

See Also


Plugin Details

Severity: Medium

ID: 17322

File Name: tomcat_malformed_request_dos.nasl

Version: $Revision: 1.21 $

Type: remote

Family: Web Servers

Published: 2005/03/15

Modified: 2018/01/24

Dependencies: 39446

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Required KB Items: installed_sw/Apache Tomcat, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2005/03/14

Reference Information

CVE: CVE-2005-0808

BID: 12795

OSVDB: 14770