Vulnerabilidad en Apache Tomcat (CVE-2011-2204)
Gravedad CVSS v2.0:
BAJA
Tipo:
CWE-200
Revelación de información
Fecha de publicación:
29/06/2011
Última modificación:
11/04/2025
Descripción
Apache Tomcat v5.5.x antes de v5.5.34, v6.0.33 antes de v6.x, v7.x antes de v7.0.17, cuando el MemoryUserDatabase se utiliza, crea entradas del registro que contienen las contraseñas al encontrar errores en la creación de usuarios JMX, lo que permite a usuarios locales obtener información sensible mediante la lectura de un archivo de registro.
Impacto
Puntuación base 2.0
1.90
Gravedad 2.0
BAJA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
- http://marc.info/?l=bugtraq&m=132215163318824&w=2
- http://marc.info/?l=bugtraq&m=132215163318824&w=2
- http://marc.info/?l=bugtraq&m=133469267822771&w=2
- http://marc.info/?l=bugtraq&m=133469267822771&w=2
- http://marc.info/?l=bugtraq&m=136485229118404&w=2
- http://marc.info/?l=bugtraq&m=136485229118404&w=2
- http://marc.info/?l=bugtraq&m=139344343412337&w=2
- http://secunia.com/advisories/44981
- http://secunia.com/advisories/48308
- http://secunia.com/advisories/57126
- http://securitytracker.com/id?1025712=
- http://support.apple.com/kb/HT5130
- http://tomcat.apache.org/security-5.html
- http://tomcat.apache.org/security-6.html
- http://tomcat.apache.org/security-7.html
- http://www.debian.org/security/2012/dsa-2401
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A156
- http://www.osvdb.org/73429
- http://www.redhat.com/support/errata/RHSA-2011-1845.html
- http://www.securityfocus.com/bid/48456
- https://bugzilla.redhat.com/show_bug.cgi?id=717013
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68238
- https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14931
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19532
- http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
- http://marc.info/?l=bugtraq&m=132215163318824&w=2
- http://marc.info/?l=bugtraq&m=132215163318824&w=2
- http://marc.info/?l=bugtraq&m=133469267822771&w=2
- http://marc.info/?l=bugtraq&m=133469267822771&w=2
- http://marc.info/?l=bugtraq&m=136485229118404&w=2
- http://marc.info/?l=bugtraq&m=136485229118404&w=2
- http://marc.info/?l=bugtraq&m=139344343412337&w=2
- http://secunia.com/advisories/44981
- http://secunia.com/advisories/48308
- http://secunia.com/advisories/57126
- http://securitytracker.com/id?1025712=
- http://support.apple.com/kb/HT5130
- http://tomcat.apache.org/security-5.html
- http://tomcat.apache.org/security-6.html
- http://tomcat.apache.org/security-7.html
- http://www.debian.org/security/2012/dsa-2401
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A156
- http://www.osvdb.org/73429
- http://www.redhat.com/support/errata/RHSA-2011-1845.html
- http://www.securityfocus.com/bid/48456
- https://bugzilla.redhat.com/show_bug.cgi?id=717013
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68238
- https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14931
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19532



