Apache Tomcat 6.0.x < 6.0.35 Multiple Vulnerabilities

High Nessus Network Monitor Plugin ID 6332


The remote web server is affected by a denial of service vulnerability.


Versions of Apache Tomcat 6.0.35 are potentially affected by multiple vulnerabilities :

- Specially crafted requests are incorrectly processed by Tomcat and can cause the server to allow injection of arbitrary AJP messages. This can lead to authentication bypass and disclosure of sensitive information. Note this vulnerability only occurs when the following are true (CVE-2011-3190):

- the org.apache.jk.server.JkCoyoteHandler AJP connector is not used.
- POST requests are accepted.
- Large numbers of crafted form parameters can cause excessive CPU consumption due to hash collisions. (CVE-2011-4858, CVE-2012-0022)


Upgrade to Apache Tomcat 6.0.35 or later.

See Also





Plugin Details

Severity: High

ID: 6332

Family: Web Servers

Published: 2012/02/22

Updated: 2019/03/06

Dependencies: 3057

Nessus ID: 57080

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 7.3

Temporal Score: 6.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Patch Publication Date: 2011/12/05

Vulnerability Publication Date: 2011/08/20

Reference Information

CVE: CVE-2011-3190, CVE-2011-3375, CVE-2011-4858, CVE-2012-0022

BID: 49353, 51200, 51442, 51447