First published: Wed Jul 13 2011(Updated: )
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.19 | 7.0.19 |
maven/org.apache.tomcat:tomcat | >=6.0.0<6.0.33 | 6.0.33 |
maven/org.apache.tomcat:tomcat | <5.5.34 | 5.5.34 |
Tomcat | =5.5.0 | |
Tomcat | =5.5.1 | |
Tomcat | =5.5.2 | |
Tomcat | =5.5.3 | |
Tomcat | =5.5.4 | |
Tomcat | =5.5.5 | |
Tomcat | =5.5.6 | |
Tomcat | =5.5.7 | |
Tomcat | =5.5.8 | |
Tomcat | =5.5.9 | |
Tomcat | =5.5.10 | |
Tomcat | =5.5.11 | |
Tomcat | =5.5.12 | |
Tomcat | =5.5.13 | |
Tomcat | =5.5.14 | |
Tomcat | =5.5.15 | |
Tomcat | =5.5.16 | |
Tomcat | =5.5.17 | |
Tomcat | =5.5.18 | |
Tomcat | =5.5.19 | |
Tomcat | =5.5.20 | |
Tomcat | =5.5.21 | |
Tomcat | =5.5.22 | |
Tomcat | =5.5.23 | |
Tomcat | =5.5.24 | |
Tomcat | =5.5.25 | |
Tomcat | =5.5.26 | |
Tomcat | =5.5.27 | |
Tomcat | =5.5.28 | |
Tomcat | =5.5.29 | |
Tomcat | =5.5.30 | |
Tomcat | =5.5.31 | |
Tomcat | =5.5.32 | |
Tomcat | =5.5.33 | |
Tomcat | =6.0 | |
Tomcat | =6.0.0 | |
Tomcat | =6.0.1 | |
Tomcat | =6.0.2 | |
Tomcat | =6.0.3 | |
Tomcat | =6.0.4 | |
Tomcat | =6.0.5 | |
Tomcat | =6.0.6 | |
Tomcat | =6.0.7 | |
Tomcat | =6.0.8 | |
Tomcat | =6.0.9 | |
Tomcat | =6.0.10 | |
Tomcat | =6.0.11 | |
Tomcat | =6.0.12 | |
Tomcat | =6.0.13 | |
Tomcat | =6.0.14 | |
Tomcat | =6.0.15 | |
Tomcat | =6.0.16 | |
Tomcat | =6.0.17 | |
Tomcat | =6.0.18 | |
Tomcat | =6.0.19 | |
Tomcat | =6.0.20 | |
Tomcat | =6.0.24 | |
Tomcat | =6.0.26 | |
Tomcat | =6.0.27 | |
Tomcat | =6.0.28 | |
Tomcat | =6.0.29 | |
Tomcat | =6.0.30 | |
Tomcat | =6.0.31 | |
Tomcat | =6.0.32 | |
Tomcat | =7.0.0 | |
Tomcat | =7.0.0-beta | |
Tomcat | =7.0.1 | |
Tomcat | =7.0.2 | |
Tomcat | =7.0.3 | |
Tomcat | =7.0.4 | |
Tomcat | =7.0.5 | |
Tomcat | =7.0.6 | |
Tomcat | =7.0.7 | |
Tomcat | =7.0.8 | |
Tomcat | =7.0.9 | |
Tomcat | =7.0.10 | |
Tomcat | =7.0.11 | |
Tomcat | =7.0.12 | |
Tomcat | =7.0.14 | |
Tomcat | =7.0.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2526 has a medium severity rating due to its potential for local file access bypass and denial of service.
To resolve CVE-2011-2526, upgrade your Apache Tomcat to version 7.0.19 or later, 6.0.33 or later, or 5.5.34 or later.
CVE-2011-2526 affects Apache Tomcat versions before 5.5.34, 6.0.33, and 7.0.19.
CVE-2011-2526 is primarily a local vulnerability, allowing local users to exploit it.
Exploitation of CVE-2011-2526 can lead to unauthorized file access or cause a denial of service through an infinite loop.