(Oracle Issues Fix for Solaris) Apache Tomcat Connection Processing Bug Lets Remote Users Deny Service
|
SecurityTracker Alert ID: 1028180 |
SecurityTracker URL: http://securitytracker.com/id/1028180
|
CVE Reference:
CVE-2012-4534
(Links to External Site)
|
Date: Feb 20 2013
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 6.0.0 to 6.0.35, 7.0.0 to 7.0.27
|
Description:
A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions.
A remote user can break the connection while reading the response to cause the target system to enter an infinite loop.
Systems using the NIO connector with sendfile and HTTPS enabled are affected.
Arun Neelicattu of the Red Hat Security Response Team reported this vulnerability.
|
Impact:
A remote user can the system to enter an infinite loop.
|
Solution:
Oracle has issued a fix for Solaris (11.1.4.5).
The Oracle advisory is available at:
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_apache_tomcat3
|
Vendor URL: tomcat.apache.org/ (Links to External Site)
|
Cause:
State error
|
Underlying OS: UNIX (Solaris - SunOS)
|
Underlying OS Comments: 11.1
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|