Lucene search

K
nvd[email protected]NVD:CVE-2009-0033
HistoryJun 05, 2009 - 4:00 p.m.

CVE-2009-0033

2009-06-0516:00:00
CWE-20
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

4.5 Medium

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

84.0%

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.

Affected configurations

NVD
Node
apachetomcatMatch4.1.0
OR
apachetomcatMatch4.1.1
OR
apachetomcatMatch4.1.2
OR
apachetomcatMatch4.1.3
OR
apachetomcatMatch4.1.3beta
OR
apachetomcatMatch4.1.4
OR
apachetomcatMatch4.1.5
OR
apachetomcatMatch4.1.6
OR
apachetomcatMatch4.1.7
OR
apachetomcatMatch4.1.8
OR
apachetomcatMatch4.1.9
OR
apachetomcatMatch4.1.9beta
OR
apachetomcatMatch4.1.10
OR
apachetomcatMatch4.1.11
OR
apachetomcatMatch4.1.12
OR
apachetomcatMatch4.1.13
OR
apachetomcatMatch4.1.14
OR
apachetomcatMatch4.1.15
OR
apachetomcatMatch4.1.16
OR
apachetomcatMatch4.1.17
OR
apachetomcatMatch4.1.18
OR
apachetomcatMatch4.1.19
OR
apachetomcatMatch4.1.20
OR
apachetomcatMatch4.1.21
OR
apachetomcatMatch4.1.22
OR
apachetomcatMatch4.1.23
OR
apachetomcatMatch4.1.24
OR
apachetomcatMatch4.1.25
OR
apachetomcatMatch4.1.26
OR
apachetomcatMatch4.1.27
OR
apachetomcatMatch4.1.28
OR
apachetomcatMatch4.1.29
OR
apachetomcatMatch4.1.30
OR
apachetomcatMatch4.1.31
OR
apachetomcatMatch4.1.32
OR
apachetomcatMatch4.1.33
OR
apachetomcatMatch4.1.34
OR
apachetomcatMatch4.1.35
OR
apachetomcatMatch4.1.36
OR
apachetomcatMatch4.1.37
OR
apachetomcatMatch4.1.38
OR
apachetomcatMatch4.1.39
OR
apachetomcatMatch5.5.0
OR
apachetomcatMatch5.5.1
OR
apachetomcatMatch5.5.2
OR
apachetomcatMatch5.5.3
OR
apachetomcatMatch5.5.4
OR
apachetomcatMatch5.5.5
OR
apachetomcatMatch5.5.6
OR
apachetomcatMatch5.5.7
OR
apachetomcatMatch5.5.8
OR
apachetomcatMatch5.5.9
OR
apachetomcatMatch5.5.10
OR
apachetomcatMatch5.5.11
OR
apachetomcatMatch5.5.12
OR
apachetomcatMatch5.5.13
OR
apachetomcatMatch5.5.14
OR
apachetomcatMatch5.5.15
OR
apachetomcatMatch5.5.16
OR
apachetomcatMatch5.5.17
OR
apachetomcatMatch5.5.18
OR
apachetomcatMatch5.5.19
OR
apachetomcatMatch5.5.20
OR
apachetomcatMatch5.5.21
OR
apachetomcatMatch5.5.22
OR
apachetomcatMatch5.5.23
OR
apachetomcatMatch5.5.24
OR
apachetomcatMatch5.5.25
OR
apachetomcatMatch5.5.26
OR
apachetomcatMatch5.5.27
OR
apachetomcatMatch6.0.0
OR
apachetomcatMatch6.0.1
OR
apachetomcatMatch6.0.2
OR
apachetomcatMatch6.0.3
OR
apachetomcatMatch6.0.4
OR
apachetomcatMatch6.0.5
OR
apachetomcatMatch6.0.6
OR
apachetomcatMatch6.0.7
OR
apachetomcatMatch6.0.8
OR
apachetomcatMatch6.0.9
OR
apachetomcatMatch6.0.10
OR
apachetomcatMatch6.0.11
OR
apachetomcatMatch6.0.12
OR
apachetomcatMatch6.0.13
OR
apachetomcatMatch6.0.14
OR
apachetomcatMatch6.0.15
OR
apachetomcatMatch6.0.16

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

4.5 Medium

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

84.0%