[UNIX] Tomcat Duplicate Request Processing Vulnerability



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Tomcat Duplicate Request Processing Vulnerability
------------------------------------------------------------------------


SUMMARY

When using the native (APR based) connector, connecting to the SSL port
using netcat and then disconnecting without sending any data will cause
Tomcat to handle a duplicate copy of one of the recent requests.

DETAILS

Vulnerable Systems:
* Tomcat version 5.5.11 up to 5.5.25
* Tomcat version 6.0.0 up to 6.0.15

Immune Systems:
* Tomcat version 5.5.26
* Tomcat version 6.0.16

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6286>
CVE-2007-6286


ADDITIONAL INFORMATION

The information has been provided by <mailto:markt@xxxxxxxxxx> Mark
Thomas.
The original article can be found at:
<http://tomcat.apache.org/security.html>
http://tomcat.apache.org/security.html



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NEWS] Apache Tomcat JK Web Server Connector Long URL Stack Overflow
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Apache Tomcat JK Web Server Connector Long URL Stack Overflow ... Authentication is not required to exploit this vulnerability. ...
    (Securiteam)
  • [NEWS] Tomcat Documentation XSS Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Tomcat Documentation XSS Vulnerabilities ...
    (Securiteam)
  • [UNIX] Apache Tomcat XSS Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Apache Tomcat XSS Vulnerability ... result in arbitrary content being injected into the HTTP response. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
    (Securiteam)
  • [UNIX] Apache Tomcat Information Disclosure (RemoteFilterValve)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Apache Tomcat Information Disclosure (RemoteFilterValve) ... Tomcat can, in very rare circumstances, permit a user from a non-permitted ...
    (Securiteam)
  • [UNIX] Tomcat Cookie Handling Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Tomcat Cookie Handling Vulnerabilities ... The previous fix for Tomcat vulnerability CVE-2007-3385 was incomplete. ...
    (Securiteam)