First published: Fri Apr 08 2011(Updated: )
The HTTP BIO connector in Apache Tomcat 7.0.x before 7.0.12 does not properly handle HTTP pipelining, which allows remote attackers to read responses intended for other clients in opportunistic circumstances by examining the application data in HTTP packets, related to "a mix-up of responses for requests from different users."
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.12 | 7.0.12 |
Apache Tomcat | =7.0.0 | |
Apache Tomcat | =7.0.0-beta | |
Apache Tomcat | =7.0.1 | |
Apache Tomcat | =7.0.2 | |
Apache Tomcat | =7.0.3 | |
Apache Tomcat | =7.0.4 | |
Apache Tomcat | =7.0.5 | |
Apache Tomcat | =7.0.6 | |
Apache Tomcat | =7.0.7 | |
Apache Tomcat | =7.0.8 | |
Apache Tomcat | =7.0.9 | |
Apache Tomcat | =7.0.10 | |
Apache Tomcat | =7.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1475 has a medium severity rating allowing attackers to potentially read responses meant for other clients.
CVE-2011-1475 affects Apache Tomcat versions from 7.0.0 to 7.0.11.
To fix CVE-2011-1475, upgrade Apache Tomcat to version 7.0.12 or later.
CVE-2011-1475 can be exploited by attackers using HTTP pipelining to read other clients' responses.
There are no specific workarounds for CVE-2011-1475; upgrading to the patched version is recommended.