6.8 Medium
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.651 Medium
EPSS
Percentile
97.9%
It was discovered that Tomcat incorrectly performed certain caching and
recycling operations. A remote attacker could use this flaw to obtain read
access to IP address and HTTP header information in certain cases. This
issue only applied to Ubuntu 11.10. (CVE-2011-3375)
It was discovered that Tomcat computed hash values for form parameters
without restricting the ability to trigger hash collisions predictably.
A remote attacker could cause a denial of service by sending many crafted
parameters. (CVE-2011-4858)
It was discovered that Tomcat incorrectly handled parameters. A remote
attacker could cause a denial of service by sending requests with a large
number of parameters and values. (CVE-2012-0022)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 11.10 | noarch | libtomcat6-java | <ย 6.0.32-5ubuntu1.2 | UNKNOWN |
Ubuntu | 11.10 | noarch | libservlet2.5-java | <ย 6.0.32-5ubuntu1.2 | UNKNOWN |
Ubuntu | 11.10 | noarch | libservlet2.5-java-doc | <ย 6.0.32-5ubuntu1.2 | UNKNOWN |
Ubuntu | 11.10 | noarch | tomcat6 | <ย 6.0.32-5ubuntu1.2 | UNKNOWN |
Ubuntu | 11.10 | noarch | tomcat6-admin | <ย 6.0.32-5ubuntu1.2 | UNKNOWN |
Ubuntu | 11.10 | noarch | tomcat6-common | <ย 6.0.32-5ubuntu1.2 | UNKNOWN |
Ubuntu | 11.10 | noarch | tomcat6-docs | <ย 6.0.32-5ubuntu1.2 | UNKNOWN |
Ubuntu | 11.10 | noarch | tomcat6-examples | <ย 6.0.32-5ubuntu1.2 | UNKNOWN |
Ubuntu | 11.10 | noarch | tomcat6-extras | <ย 6.0.32-5ubuntu1.2 | UNKNOWN |
Ubuntu | 11.10 | noarch | tomcat6-user | <ย 6.0.32-5ubuntu1.2 | UNKNOWN |