Author: markt
Date: Thu Oct 9 15:39:48 2008
New Revision: 703284
URL: http://svn.apache.org/viewvc?rev=703284&view=rev
Log:
Update with details of CVE-2008-3271
Modified:
tomcat/site/trunk/docs/security-4.html
tomcat/site/trunk/docs/security-5.html
tomcat/site/trunk/xdocs/security-4.xml
tomcat/site/trunk/xdocs/security-5.xml
Modified: tomcat/site/trunk/docs/security-4.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?rev=703284&r1=703283&r2=703284&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-4.html (original)
+++ tomcat/site/trunk/docs/security-4.html Thu Oct 9 15:39:48 2008
@@ -618,6 +618,22 @@
<blockquote>
<p>
+<strong>low: Information disclosure</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3271">
+ CVE-2008-3271</a>
+</p>
+
+ <p>
+<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835">
+ Bug 25835</a> can, in rare circumstances - this has only been reproduced
+ using a debugger to force a particular processing sequence for two threads
-
+ allow a user from a non-premitted IP address to gain access to a context
+ that is protected with a valve that extends RemoteFilterValve. This
includes
+ the standard RemoteAddrValve and RemoteHostValve implementations.</p>
+
+ <p>Affects: 4.1.0-4.1.31</p>
+
+ <p>
<strong>important: Information disclosure</strong>
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1858">
CVE-2007-1858</a>
Modified: tomcat/site/trunk/docs/security-5.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?rev=703284&r1=703283&r2=703284&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-5.html (original)
+++ tomcat/site/trunk/docs/security-5.html Thu Oct 9 15:39:48 2008
@@ -899,6 +899,45 @@
<tr>
<td bgcolor="#525D76">
<font color="#ffffff" face="arial,helvetica,sanserif">
+<a name="Fixed in Apache Tomcat 5.5.1">
+<strong>Fixed in Apache Tomcat 5.5.1</strong>
+</a>
+</font>
+</td>
+</tr>
+<tr>
+<td>
+<p>
+<blockquote>
+ <p>
+<strong>low: Information disclosure</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3271">
+ CVE-2008-3271</a>
+</p>
+
+ <p>
+<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835">
+ Bug 25835</a> can, in rare circumstances - this has only been reproduced
+ using a debugger to force a particular processing sequence for two threads
-
+ allow a user from a non-premitted IP address to gain access to a context
+ that is protected with a valve that extends RemoteFilterValve. This
includes
+ the standard RemoteAddrValve and RemoteHostValve implementations.</p>
+
+ <p>Affects: 5.5.0 (5.0.x unknown)</p>
+ </blockquote>
+</p>
+</td>
+</tr>
+<tr>
+<td>
+<br/>
+</td>
+</tr>
+</table>
+<table border="0" cellspacing="0" cellpadding="2" width="100%">
+<tr>
+<td bgcolor="#525D76">
+<font color="#ffffff" face="arial,helvetica,sanserif">
<a name="Not a vulnerability in Tomcat">
<strong>Not a vulnerability in Tomcat</strong>
</a>
Modified: tomcat/site/trunk/xdocs/security-4.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-4.xml?rev=703284&r1=703283&r2=703284&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-4.xml (original)
+++ tomcat/site/trunk/xdocs/security-4.xml Thu Oct 9 15:39:48 2008
@@ -296,6 +296,19 @@
<section name="Fixed in Apache Tomcat 4.1.32">
+ <p><strong>low: Information disclosure</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3271">
+ CVE-2008-3271</a></p>
+
+ <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835">
+ Bug 25835</a> can, in rare circumstances - this has only been reproduced
+ using a debugger to force a particular processing sequence for two threads
-
+ allow a user from a non-premitted IP address to gain access to a context
+ that is protected with a valve that extends RemoteFilterValve. This
includes
+ the standard RemoteAddrValve and RemoteHostValve implementations.</p>
+
+ <p>Affects: 4.1.0-4.1.31</p>
+
<p><strong>important: Information disclosure</strong>
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1858">
CVE-2007-1858</a></p>
Modified: tomcat/site/trunk/xdocs/security-5.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?rev=703284&r1=703283&r2=703284&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-5.xml (original)
+++ tomcat/site/trunk/xdocs/security-5.xml Thu Oct 9 15:39:48 2008
@@ -385,6 +385,21 @@
<p>Affects: 5.0.0-5.0.30, 5.5.0-5.5.6</p>
</section>
+ <section name="Fixed in Apache Tomcat 5.5.1">
+ <p><strong>low: Information disclosure</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3271">
+ CVE-2008-3271</a></p>
+
+ <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835">
+ Bug 25835</a> can, in rare circumstances - this has only been reproduced
+ using a debugger to force a particular processing sequence for two threads
-
+ allow a user from a non-premitted IP address to gain access to a context
+ that is protected with a valve that extends RemoteFilterValve. This
includes
+ the standard RemoteAddrValve and RemoteHostValve implementations.</p>
+
+ <p>Affects: 5.5.0 (5.0.x unknown)</p>
+ </section>
+
<section name="Not a vulnerability in Tomcat">
<p><strong>JavaMail information disclosure</strong>
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1754">
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]