Lucene search

K
cveRedhatCVE-2009-0033
HistoryJun 05, 2009 - 4:00 p.m.

CVE-2009-0033

2009-06-0516:00:00
CWE-20
redhat
web.nvd.nist.gov
88
cve-2009-0033
apache tomcat
denial of service
vulnerability

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

4.5

Confidence

High

EPSS

0.01

Percentile

84.0%

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.

Affected configurations

Nvd
Node
apachetomcatMatch4.1.0
OR
apachetomcatMatch4.1.1
OR
apachetomcatMatch4.1.2
OR
apachetomcatMatch4.1.3
OR
apachetomcatMatch4.1.3beta
OR
apachetomcatMatch4.1.4
OR
apachetomcatMatch4.1.5
OR
apachetomcatMatch4.1.6
OR
apachetomcatMatch4.1.7
OR
apachetomcatMatch4.1.8
OR
apachetomcatMatch4.1.9
OR
apachetomcatMatch4.1.9beta
OR
apachetomcatMatch4.1.10
OR
apachetomcatMatch4.1.11
OR
apachetomcatMatch4.1.12
OR
apachetomcatMatch4.1.13
OR
apachetomcatMatch4.1.14
OR
apachetomcatMatch4.1.15
OR
apachetomcatMatch4.1.16
OR
apachetomcatMatch4.1.17
OR
apachetomcatMatch4.1.18
OR
apachetomcatMatch4.1.19
OR
apachetomcatMatch4.1.20
OR
apachetomcatMatch4.1.21
OR
apachetomcatMatch4.1.22
OR
apachetomcatMatch4.1.23
OR
apachetomcatMatch4.1.24
OR
apachetomcatMatch4.1.25
OR
apachetomcatMatch4.1.26
OR
apachetomcatMatch4.1.27
OR
apachetomcatMatch4.1.28
OR
apachetomcatMatch4.1.29
OR
apachetomcatMatch4.1.30
OR
apachetomcatMatch4.1.31
OR
apachetomcatMatch4.1.32
OR
apachetomcatMatch4.1.33
OR
apachetomcatMatch4.1.34
OR
apachetomcatMatch4.1.35
OR
apachetomcatMatch4.1.36
OR
apachetomcatMatch4.1.37
OR
apachetomcatMatch4.1.38
OR
apachetomcatMatch4.1.39
OR
apachetomcatMatch5.5.0
OR
apachetomcatMatch5.5.1
OR
apachetomcatMatch5.5.2
OR
apachetomcatMatch5.5.3
OR
apachetomcatMatch5.5.4
OR
apachetomcatMatch5.5.5
OR
apachetomcatMatch5.5.6
OR
apachetomcatMatch5.5.7
OR
apachetomcatMatch5.5.8
OR
apachetomcatMatch5.5.9
OR
apachetomcatMatch5.5.10
OR
apachetomcatMatch5.5.11
OR
apachetomcatMatch5.5.12
OR
apachetomcatMatch5.5.13
OR
apachetomcatMatch5.5.14
OR
apachetomcatMatch5.5.15
OR
apachetomcatMatch5.5.16
OR
apachetomcatMatch5.5.17
OR
apachetomcatMatch5.5.18
OR
apachetomcatMatch5.5.19
OR
apachetomcatMatch5.5.20
OR
apachetomcatMatch5.5.21
OR
apachetomcatMatch5.5.22
OR
apachetomcatMatch5.5.23
OR
apachetomcatMatch5.5.24
OR
apachetomcatMatch5.5.25
OR
apachetomcatMatch5.5.26
OR
apachetomcatMatch5.5.27
OR
apachetomcatMatch6.0.0
OR
apachetomcatMatch6.0.1
OR
apachetomcatMatch6.0.2
OR
apachetomcatMatch6.0.3
OR
apachetomcatMatch6.0.4
OR
apachetomcatMatch6.0.5
OR
apachetomcatMatch6.0.6
OR
apachetomcatMatch6.0.7
OR
apachetomcatMatch6.0.8
OR
apachetomcatMatch6.0.9
OR
apachetomcatMatch6.0.10
OR
apachetomcatMatch6.0.11
OR
apachetomcatMatch6.0.12
OR
apachetomcatMatch6.0.13
OR
apachetomcatMatch6.0.14
OR
apachetomcatMatch6.0.15
OR
apachetomcatMatch6.0.16
VendorProductVersionCPE
apachetomcat4.1.0cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*
apachetomcat4.1.1cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*
apachetomcat4.1.2cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*
apachetomcat4.1.3cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*
apachetomcat4.1.3cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*
apachetomcat4.1.4cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*
apachetomcat4.1.5cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*
apachetomcat4.1.6cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*
apachetomcat4.1.7cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*
apachetomcat4.1.8cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*
Rows per page:
1-10 of 871

References

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

4.5

Confidence

High

EPSS

0.01

Percentile

84.0%