Vulnerabilidad en Apache Tomcat de 5.5.11 a 5.5.25 y de 6.0.0 a 6.0.15, no maneja correctamente una petición vacía al puerto SSL (CVE-2007-6286)
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
12/02/2008
Última modificación:
09/04/2025
Descripción
Apache Tomcat de 5.5.11 a 5.5.25 y de 6.0.0 a 6.0.15, cuando se utiliza el conector ARP nativo no maneja correctamente una petición vacía al puerto SSL, lo que permite a atacantes remotos disparar el manejo de "una copia duplicada de una de las peticiones recientes", como se demostró utilizando netcat para enviar la petición vacía.
Impacto
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
- http://marc.info/?l=bugtraq&m=139344343412337&w=2
- http://secunia.com/advisories/28878
- http://secunia.com/advisories/28915
- http://secunia.com/advisories/29711
- http://secunia.com/advisories/30676
- http://secunia.com/advisories/32222
- http://secunia.com/advisories/37460
- http://secunia.com/advisories/57126
- http://security.gentoo.org/glsa/glsa-200804-10.xml
- http://securityreason.com/securityalert/3637
- http://support.apple.com/kb/HT3216
- http://tomcat.apache.org/security-5.html
- http://tomcat.apache.org/security-6.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A136
- http://www.securityfocus.com/archive/1/487823/100/0/threaded
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://www.securityfocus.com/bid/31681
- http://www.vmware.com/security/advisories/VMSA-2008-0010.html
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2008/0488
- http://www.vupen.com/english/advisories/2008/1856/references
- http://www.vupen.com/english/advisories/2008/2780
- http://www.vupen.com/english/advisories/2009/3316
- https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html
- http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
- http://marc.info/?l=bugtraq&m=139344343412337&w=2
- http://secunia.com/advisories/28878
- http://secunia.com/advisories/28915
- http://secunia.com/advisories/29711
- http://secunia.com/advisories/30676
- http://secunia.com/advisories/32222
- http://secunia.com/advisories/37460
- http://secunia.com/advisories/57126
- http://security.gentoo.org/glsa/glsa-200804-10.xml
- http://securityreason.com/securityalert/3637
- http://support.apple.com/kb/HT3216
- http://tomcat.apache.org/security-5.html
- http://tomcat.apache.org/security-6.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A136
- http://www.securityfocus.com/archive/1/487823/100/0/threaded
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://www.securityfocus.com/bid/31681
- http://www.vmware.com/security/advisories/VMSA-2008-0010.html
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2008/0488
- http://www.vupen.com/english/advisories/2008/1856/references
- http://www.vupen.com/english/advisories/2008/2780
- http://www.vupen.com/english/advisories/2009/3316
- https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html



