Lucene search

K
nessusTenable6623.PASL
HistoryNov 26, 2012 - 12:00 a.m.

Apache Tomcat 7.0.x < 7.0.28 Multiple DoS

2012-11-2600:00:00
Tenable
www.tenable.com
19

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.705 High

EPSS

Percentile

98.1%

According to its self-reported version number, the instance of Apache Tomcat 7.0 listening on the remote host is prior to 7.0.28. It is, therefore, affected by the following vulnerabilities:

  • A flaw exists within the parseHeaders() function that allows an attacker, via a crafted header, to cause a remote denial of service. (CVE-2012-2733)

  • An error exists related to the ‘NIO’ connector when HTTPS and ‘sendfile’ are enabled that can force the application into an infinite loop. (CVE-2012-4534)

Note that Nessus Network Monitor has not tested for these issues but has instead relied only on the application’s self-reported version number.

Binary data 6623.pasl
VendorProductVersionCPE
apachetomcatcpe:/a:apache:tomcat

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.705 High

EPSS

Percentile

98.1%