First published: Wed Jul 13 2011(Updated: )
The Tomcat sendfile support (when HTTP APR or HTTP NIO connectors are enabled) allows to send large static files. These writes, as soon as the system load increases, will be performed asynchronously in the most efficient way. It was found that Tomcat, the Apache Servlet/JSP Engine, did not properly sanitize arguments provided to sendfile call methods, when a web application was running under the security manager: 1) such application could use the sendfile support to expose server files, that should be made inaccessible by the security manager, 2) when HTTP APR/native connector was used, such application could specify invalid sendfile start/end points and trigger a JVM crash.
Affected Software | Affected Version | How to fix |
---|---|---|
Tomcat |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-720948 is considered moderate as it affects the handling of large static files in Tomcat.
To fix REDHAT-BUG-720948, you should update to a patched version of Apache Tomcat that addresses this issue.
REDHAT-BUG-720948 affects specific versions of Apache Tomcat where the sendfile support is enabled.
REDHAT-BUG-720948 can lead to inefficient handling of large file transfers under high system load, potentially degrading performance.
As of now, there are no publicly known exploits for REDHAT-BUG-720948, but it is advisable to apply security updates promptly.