CVE-2003-0866

The Catalina org.apache.catalina.connector.http package in Tomcat 4.0.x up to 4.0.3 allows remote attackers to cause a denial of service via several requests that do not follow the HTTP protocol, which causes Tomcat to reject later requests.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=215506 Exploit Patch Vendor Advisory
http://secunia.com/advisories/30899
http://secunia.com/advisories/30908
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
http://tomcat.apache.org/security-4.html
http://www.debian.org/security/2003/dsa-395 Patch Vendor Advisory
http://www.securityfocus.com/bid/8824 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2008/1979/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/13429
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=215506 Exploit Patch Vendor Advisory
http://secunia.com/advisories/30899
http://secunia.com/advisories/30908
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
http://tomcat.apache.org/security-4.html
http://www.debian.org/security/2003/dsa-395 Patch Vendor Advisory
http://www.securityfocus.com/bid/8824 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2008/1979/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/13429
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*

History

20 Nov 2024, 23:45

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=215506 - Exploit, Patch, Vendor Advisory () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=215506 - Exploit, Patch, Vendor Advisory
References () http://secunia.com/advisories/30899 - () http://secunia.com/advisories/30899 -
References () http://secunia.com/advisories/30908 - () http://secunia.com/advisories/30908 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1 -
References () http://tomcat.apache.org/security-4.html - () http://tomcat.apache.org/security-4.html -
References () http://www.debian.org/security/2003/dsa-395 - Patch, Vendor Advisory () http://www.debian.org/security/2003/dsa-395 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/8824 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/8824 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/1979/references - () http://www.vupen.com/english/advisories/2008/1979/references -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/13429 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/13429 -
References () https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E -
References () https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E -
References () https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E -

07 Nov 2023, 01:56

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E', 'name': '[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E', 'name': '[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E', 'name': '[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E -
  • () https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E -
  • () https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E -

Information

Published : 2003-11-17 05:00

Updated : 2024-11-20 23:45


NVD link : CVE-2003-0866

Mitre link : CVE-2003-0866

CVE.ORG link : CVE-2003-0866


JSON object : View

Products Affected

apache

  • tomcat