CVE-2008-3271

Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.
References
Link Resource
http://jvn.jp/en/jp/JVN30732239/index.html
http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000069.html
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html
http://secunia.com/advisories/32213 Vendor Advisory
http://secunia.com/advisories/32234 Vendor Advisory
http://secunia.com/advisories/32398 Vendor Advisory
http://secunia.com/advisories/35684
http://securityreason.com/securityalert/4396
http://tomcat.apache.org/security-4.html Vendor Advisory
http://tomcat.apache.org/security-5.html
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200806e.html
http://www.nec.co.jp/security-info/secinfo/nv09-006.html
http://www.securityfocus.com/archive/1/497220/100/0/threaded
http://www.securityfocus.com/bid/31698
http://www.securitytracker.com/id?1021039
http://www.vupen.com/english/advisories/2008/2793
http://www.vupen.com/english/advisories/2008/2800
http://www.vupen.com/english/advisories/2009/1818
https://exchange.xforce.ibmcloud.com/vulnerabilities/45791
https://issues.apache.org/bugzilla/show_bug.cgi?id=25835
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
http://jvn.jp/en/jp/JVN30732239/index.html
http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000069.html
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html
http://secunia.com/advisories/32213 Vendor Advisory
http://secunia.com/advisories/32234 Vendor Advisory
http://secunia.com/advisories/32398 Vendor Advisory
http://secunia.com/advisories/35684
http://securityreason.com/securityalert/4396
http://tomcat.apache.org/security-4.html Vendor Advisory
http://tomcat.apache.org/security-5.html
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200806e.html
http://www.nec.co.jp/security-info/secinfo/nv09-006.html
http://www.securityfocus.com/archive/1/497220/100/0/threaded
http://www.securityfocus.com/bid/31698
http://www.securitytracker.com/id?1021039
http://www.vupen.com/english/advisories/2008/2793
http://www.vupen.com/english/advisories/2008/2800
http://www.vupen.com/english/advisories/2009/1818
https://exchange.xforce.ibmcloud.com/vulnerabilities/45791
https://issues.apache.org/bugzilla/show_bug.cgi?id=25835
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:48

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN30732239/index.html - () http://jvn.jp/en/jp/JVN30732239/index.html -
References () http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000069.html - () http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000069.html -
References () http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html - () http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html -
References () http://secunia.com/advisories/32213 - Vendor Advisory () http://secunia.com/advisories/32213 - Vendor Advisory
References () http://secunia.com/advisories/32234 - Vendor Advisory () http://secunia.com/advisories/32234 - Vendor Advisory
References () http://secunia.com/advisories/32398 - Vendor Advisory () http://secunia.com/advisories/32398 - Vendor Advisory
References () http://secunia.com/advisories/35684 - () http://secunia.com/advisories/35684 -
References () http://securityreason.com/securityalert/4396 - () http://securityreason.com/securityalert/4396 -
References () http://tomcat.apache.org/security-4.html - Vendor Advisory () http://tomcat.apache.org/security-4.html - Vendor Advisory
References () http://tomcat.apache.org/security-5.html - () http://tomcat.apache.org/security-5.html -
References () http://www.fujitsu.com/global/support/software/security/products-f/interstage-200806e.html - () http://www.fujitsu.com/global/support/software/security/products-f/interstage-200806e.html -
References () http://www.nec.co.jp/security-info/secinfo/nv09-006.html - () http://www.nec.co.jp/security-info/secinfo/nv09-006.html -
References () http://www.securityfocus.com/archive/1/497220/100/0/threaded - () http://www.securityfocus.com/archive/1/497220/100/0/threaded -
References () http://www.securityfocus.com/bid/31698 - () http://www.securityfocus.com/bid/31698 -
References () http://www.securitytracker.com/id?1021039 - () http://www.securitytracker.com/id?1021039 -
References () http://www.vupen.com/english/advisories/2008/2793 - () http://www.vupen.com/english/advisories/2008/2793 -
References () http://www.vupen.com/english/advisories/2008/2800 - () http://www.vupen.com/english/advisories/2008/2800 -
References () http://www.vupen.com/english/advisories/2009/1818 - () http://www.vupen.com/english/advisories/2009/1818 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/45791 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/45791 -
References () https://issues.apache.org/bugzilla/show_bug.cgi?id=25835 - () https://issues.apache.org/bugzilla/show_bug.cgi?id=25835 -
References () https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E -
References () https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E -
References () https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E -

Information

Published : 2008-10-13 20:00

Updated : 2024-11-21 00:48


NVD link : CVE-2008-3271

Mitre link : CVE-2008-3271

CVE.ORG link : CVE-2008-3271


JSON object : View

Products Affected

apache

  • tomcat
CWE
CWE-264

Permissions, Privileges, and Access Controls