First published: Wed Jul 13 2011(Updated: )
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | =5.5.0 | |
Apache Tomcat | =5.5.1 | |
Apache Tomcat | =5.5.2 | |
Apache Tomcat | =5.5.3 | |
Apache Tomcat | =5.5.4 | |
Apache Tomcat | =5.5.5 | |
Apache Tomcat | =5.5.6 | |
Apache Tomcat | =5.5.7 | |
Apache Tomcat | =5.5.8 | |
Apache Tomcat | =5.5.9 | |
Apache Tomcat | =5.5.10 | |
Apache Tomcat | =5.5.11 | |
Apache Tomcat | =5.5.12 | |
Apache Tomcat | =5.5.13 | |
Apache Tomcat | =5.5.14 | |
Apache Tomcat | =5.5.15 | |
Apache Tomcat | =5.5.16 | |
Apache Tomcat | =5.5.17 | |
Apache Tomcat | =5.5.18 | |
Apache Tomcat | =5.5.19 | |
Apache Tomcat | =5.5.20 | |
Apache Tomcat | =5.5.21 | |
Apache Tomcat | =5.5.22 | |
Apache Tomcat | =5.5.23 | |
Apache Tomcat | =5.5.24 | |
Apache Tomcat | =5.5.25 | |
Apache Tomcat | =5.5.26 | |
Apache Tomcat | =5.5.27 | |
Apache Tomcat | =5.5.28 | |
Apache Tomcat | =5.5.29 | |
Apache Tomcat | =5.5.30 | |
Apache Tomcat | =5.5.31 | |
Apache Tomcat | =5.5.32 | |
Apache Tomcat | =5.5.33 | |
Apache Tomcat | =6.0 | |
Apache Tomcat | =6.0.0 | |
Apache Tomcat | =6.0.1 | |
Apache Tomcat | =6.0.2 | |
Apache Tomcat | =6.0.3 | |
Apache Tomcat | =6.0.4 | |
Apache Tomcat | =6.0.5 | |
Apache Tomcat | =6.0.6 | |
Apache Tomcat | =6.0.7 | |
Apache Tomcat | =6.0.8 | |
Apache Tomcat | =6.0.9 | |
Apache Tomcat | =6.0.10 | |
Apache Tomcat | =6.0.11 | |
Apache Tomcat | =6.0.12 | |
Apache Tomcat | =6.0.13 | |
Apache Tomcat | =6.0.14 | |
Apache Tomcat | =6.0.15 | |
Apache Tomcat | =6.0.16 | |
Apache Tomcat | =6.0.17 | |
Apache Tomcat | =6.0.18 | |
Apache Tomcat | =6.0.19 | |
Apache Tomcat | =6.0.20 | |
Apache Tomcat | =6.0.24 | |
Apache Tomcat | =6.0.26 | |
Apache Tomcat | =6.0.27 | |
Apache Tomcat | =6.0.28 | |
Apache Tomcat | =6.0.29 | |
Apache Tomcat | =6.0.30 | |
Apache Tomcat | =6.0.31 | |
Apache Tomcat | =6.0.32 | |
Apache Tomcat | =7.0.0 | |
Apache Tomcat | =7.0.0-beta | |
Apache Tomcat | =7.0.1 | |
Apache Tomcat | =7.0.2 | |
Apache Tomcat | =7.0.3 | |
Apache Tomcat | =7.0.4 | |
Apache Tomcat | =7.0.5 | |
Apache Tomcat | =7.0.6 | |
Apache Tomcat | =7.0.7 | |
Apache Tomcat | =7.0.8 | |
Apache Tomcat | =7.0.9 | |
Apache Tomcat | =7.0.10 | |
Apache Tomcat | =7.0.11 | |
Apache Tomcat | =7.0.12 | |
Apache Tomcat | =7.0.14 | |
Apache Tomcat | =7.0.17 | |
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.19 | 7.0.19 |
maven/org.apache.tomcat:tomcat | >=6.0.0<6.0.33 | 6.0.33 |
maven/org.apache.tomcat:tomcat | <5.5.34 | 5.5.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.