Lucene search

K
nvd[email protected]NVD:CVE-2010-2227
HistoryJul 13, 2010 - 5:30 p.m.

CVE-2010-2227

2010-07-1317:30:03
CWE-119
web.nvd.nist.gov
7

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

AI Score

5.3

Confidence

High

EPSS

0.594

Percentile

97.8%

Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with “recycling of a buffer.”

Affected configurations

Nvd
Node
apachetomcatMatch5.5.0
OR
apachetomcatMatch5.5.1
OR
apachetomcatMatch5.5.2
OR
apachetomcatMatch5.5.3
OR
apachetomcatMatch5.5.4
OR
apachetomcatMatch5.5.5
OR
apachetomcatMatch5.5.6
OR
apachetomcatMatch5.5.7
OR
apachetomcatMatch5.5.8
OR
apachetomcatMatch5.5.9
OR
apachetomcatMatch5.5.10
OR
apachetomcatMatch5.5.11
OR
apachetomcatMatch5.5.12
OR
apachetomcatMatch5.5.13
OR
apachetomcatMatch5.5.14
OR
apachetomcatMatch5.5.15
OR
apachetomcatMatch5.5.16
OR
apachetomcatMatch5.5.17
OR
apachetomcatMatch5.5.18
OR
apachetomcatMatch5.5.19
OR
apachetomcatMatch5.5.20
OR
apachetomcatMatch5.5.21
OR
apachetomcatMatch5.5.22
OR
apachetomcatMatch5.5.23
OR
apachetomcatMatch5.5.24
OR
apachetomcatMatch5.5.25
OR
apachetomcatMatch5.5.26
OR
apachetomcatMatch5.5.27
OR
apachetomcatMatch5.5.28
OR
apachetomcatMatch5.5.29
Node
apachetomcatMatch6.0.0
OR
apachetomcatMatch6.0.1
OR
apachetomcatMatch6.0.2
OR
apachetomcatMatch6.0.3
OR
apachetomcatMatch6.0.4
OR
apachetomcatMatch6.0.5
OR
apachetomcatMatch6.0.6
OR
apachetomcatMatch6.0.7
OR
apachetomcatMatch6.0.8
OR
apachetomcatMatch6.0.9
OR
apachetomcatMatch6.0.10
OR
apachetomcatMatch6.0.11
OR
apachetomcatMatch6.0.12
OR
apachetomcatMatch6.0.13
OR
apachetomcatMatch6.0.14
OR
apachetomcatMatch6.0.15
OR
apachetomcatMatch6.0.16
OR
apachetomcatMatch6.0.17
OR
apachetomcatMatch6.0.18
OR
apachetomcatMatch6.0.19
OR
apachetomcatMatch6.0.20
OR
apachetomcatMatch6.0.24
OR
apachetomcatMatch6.0.26
OR
apachetomcatMatch6.0.27
Node
apachetomcatMatch7.0.0beta
VendorProductVersionCPE
apachetomcat5.5.0cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*
apachetomcat5.5.1cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*
apachetomcat5.5.2cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*
apachetomcat5.5.3cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*
apachetomcat5.5.4cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*
apachetomcat5.5.5cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*
apachetomcat5.5.6cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*
apachetomcat5.5.7cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*
apachetomcat5.5.8cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*
apachetomcat5.5.9cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*
Rows per page:
1-10 of 551

References

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

AI Score

5.3

Confidence

High

EPSS

0.594

Percentile

97.8%