First published: Tue Feb 12 2008(Updated: )
Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | =6.0.5 | |
Apache Tomcat | =6.0.6 | |
Apache Tomcat | =6.0.7 | |
Apache Tomcat | =6.0.8 | |
Apache Tomcat | =6.0.9 | |
Apache Tomcat | =6.0.10 | |
Apache Tomcat | =6.0.11 | |
Apache Tomcat | =6.0.12 | |
Apache Tomcat | =6.0.13 | |
Apache Tomcat | =6.0.14 | |
Apache Tomcat | =6.0.15 | |
maven/org.apache.tomcat:tomcat | >=6.0.0<6.0.16 | 6.0.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0002 is categorized as a medium severity vulnerability.
To fix CVE-2008-0002, upgrade Apache Tomcat to version 6.0.16 or later.
CVE-2008-0002 affects Apache Tomcat versions 6.0.0 through 6.0.15.
CVE-2008-0002 is an information disclosure vulnerability.
Yes, CVE-2008-0002 can potentially be exploited by remote attackers.