First published: Wed May 09 2007(Updated: )
The default SSL cipher configuration in Apache Tomcat 4.1.28 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.17 uses certain insecure ciphers, including the anonymous cipher, which allows remote attackers to obtain sensitive information or have other, unspecified impacts.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | =5.0.19 | |
Apache Tomcat | =5.5.12 | |
Apache Tomcat | =5.0.14 | |
Apache Tomcat | =5.5.14 | |
Apache Tomcat | =5.5.10 | |
Apache Tomcat | =5.0.22 | |
Apache Tomcat | =5.5.4 | |
Apache Tomcat | =5.5.7 | |
Apache Tomcat | =5.5.1 | |
Apache Tomcat | =5.5.11 | |
Apache Tomcat | =5.5.6 | |
Apache Tomcat | =5.0.15 | |
Apache Tomcat | =5.0.30 | |
Apache Tomcat | =5.5.15 | |
Apache Tomcat | =5.0.23 | |
Apache Tomcat | =5.0.2 | |
Apache Tomcat | =5.5.5 | |
Apache Tomcat | =5.0.10 | |
Apache Tomcat | =5.0.21 | |
Apache Tomcat | =5.0.26 | |
Apache Tomcat | =5.0.0 | |
Apache Tomcat | =4.1.31 | |
Apache Tomcat | =5.5.3 | |
Apache Tomcat | =5.0.27 | |
Apache Tomcat | =5.0.16 | |
Apache Tomcat | =5.5.9 | |
Apache Tomcat | =5.0.18 | |
Apache Tomcat | =5.5.2 | |
Apache Tomcat | =5.0.28 | |
Apache Tomcat | =5.0.29 | |
Apache Tomcat | =5.5.0 | |
Apache Tomcat | =5.5.13 | |
Apache Tomcat | =4.1.28 | |
Apache Tomcat | =5.0.13 | |
Apache Tomcat | =5.5.8 | |
Apache Tomcat | =5.0.17 | |
Apache Tomcat | =5.5.16 | |
Apache Tomcat | =5.5.17 | |
Apache Tomcat | =5.0.25 | |
Apache Tomcat | =5.0.1 | |
Apache Tomcat | =5.0.11 | |
Apache Tomcat | =5.0.24 | |
Apache Tomcat | =5.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.