CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
75.7%
Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.
Vendor | Product | Version | CPE |
---|---|---|---|
apache | tomcat | 6.0.5 | cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:* |
apache | tomcat | 6.0.6 | cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:* |
apache | tomcat | 6.0.7 | cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:* |
apache | tomcat | 6.0.8 | cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:* |
apache | tomcat | 6.0.9 | cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:* |
apache | tomcat | 6.0.10 | cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:* |
apache | tomcat | 6.0.11 | cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:* |
apache | tomcat | 6.0.12 | cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:* |
apache | tomcat | 6.0.13 | cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:* |
apache | tomcat | 6.0.14 | cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:* |
lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
marc.info/?l=bugtraq&m=139344343412337&w=2
secunia.com/advisories/28834
secunia.com/advisories/28915
secunia.com/advisories/29711
secunia.com/advisories/32222
secunia.com/advisories/37460
secunia.com/advisories/57126
security.gentoo.org/glsa/glsa-200804-10.xml
securityreason.com/securityalert/3638
support.apple.com/kb/HT3216
tomcat.apache.org/security-6.html
www.securityfocus.com/archive/1/487812/100/0/threaded
www.securityfocus.com/archive/1/507985/100/0/threaded
www.securityfocus.com/bid/27703
www.securityfocus.com/bid/31681
www.vmware.com/security/advisories/VMSA-2009-0016.html
www.vupen.com/english/advisories/2008/0488
www.vupen.com/english/advisories/2008/2780
www.vupen.com/english/advisories/2009/3316
www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html