7 High
AI Score
Confidence
Low
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.003 Low
EPSS
Percentile
65.3%
Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.
lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
marc.info/?l=bugtraq&m=139344343412337&w=2
security.gentoo.org/glsa/glsa-200804-10.xml
support.apple.com/kb/HT3216
tomcat.apache.org/security-6.html
www.vmware.com/security/advisories/VMSA-2009-0016.html
github.com/apache/tomcat
nvd.nist.gov/vuln/detail/CVE-2008-0002
web.archive.org/web/20080214133036/secunia.com/advisories/28915
web.archive.org/web/20080715062302/secunia.com/advisories/29711
web.archive.org/web/20080724052339/secunia.com/advisories/28834
web.archive.org/web/20081012021650/www.securityfocus.com/bid/27703
web.archive.org/web/20081013050642/secunia.com/advisories/32222
web.archive.org/web/20081120062646/securityreason.com/securityalert/3638
web.archive.org/web/20081121133027/www.securityfocus.com/archive/1/487812/100/0/threaded
web.archive.org/web/20091125140215/secunia.com/advisories/37460
web.archive.org/web/20120825080137/www.securityfocus.com/bid/31681
web.archive.org/web/20140723000733/secunia.com/advisories/57126
web.archive.org/web/20150621204350/www.securityfocus.com/archive/1/507985/100/0/threaded
www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html