From: ma...@apache.org
Subject: Re: [SECURITY] CVE-2008-4308: Tomcat information disclosure 
vulnerability
Date: Thu, 05 Mar 2009 12:45:10 +0100

> nambo.k...@oss.ntt.co.jp wrote:
> > Hi, Mark.
> > 
> >> The unsupported Tomcat 3.x, 4.0.x and 5.0.x versions may be also affected
> > I checked Tomcat 5.0.x source code and I've found that 
> > org.apache.coyote.http11.filters.SavedRequestInputFilter is NOT included.
> > Does this mean Tomcat 5.0.x is not affected by this vulnerability?
> 
> I would assume so but haven't confirmed this as 5.0.x is unsupported.

OK, I understand.

BTW I've found a typo in the security reports.
  http://tomcat.apache.org/security-5.html
  http://tomcat.apache.org/security-4.html
    low: Information disclosure CVE-2008-4308 
    Bug 40711 may result in the disclosure of POSTed .....

40711 -> 40771.

Best regards,
Kazu Nambo



> 
> Mark
> 
> > 
> > Advice, please.
> > Kazu Nambo
> > 
> > 
> > From: ma...@apache.org
> > Subject: [SECURITY] CVE-2008-4308: Tomcat information disclosure 
> > vulnerability
> > Date: Wed, 25 Feb 2009 23:17:37 +0000
> > 
> > CVE-2008-4308: Tomcat information disclosure vulnerability
> > 
> > Severity: Low
> > 
> > Vendor:
> > The Apache Software Foundation
> > 
> > Versions Affected:
> > Tomcat 4.1.32 to 4.1.34
> > Tomcat 5.5.10 to 5.5.20
> > Tomcat 6.0.x is not affected
> > The unsupported Tomcat 3.x, 4.0.x and 5.0.x versions may be also affected
> > 
> > Note: Although this vulnerability affects relatively old versions of
> > Apache Tomcat, it was only discovered and reported to the Apache Tomcat
> > Security team in October 2008. Publication of this issue was then
> > postponed until now at the request of the reporter.
> > 
> > Description:
> > Bug 40771 (https://issues.apache.org/bugzilla/show_bug.cgi?id=40771) may
> > result in the disclosure of POSTed content from a previous request. For
> > a vulnerability to exist the content read from the input stream must be
> > disclosed, eg via writing it to the response and committing the
> > response, before the ArrayIndexOutOfBoundsException occurs which will
> > halt processing of the request.
> > 
> > Mitigation:
> > Upgrade to:
> > 4.1.35 or later
> > 5.5.21 or later
> > 6.0.0 or later
> > 
> > Example:
> > See original bug report for example of how to create the error condition.
> > 
> > Credit:
> > This issue was discovered by Fujitsu and reported to the Tomcat Security
> > Team via JPCERT.
> > 
> > References:
> > http://tomcat.apache.org/security.html
> > 
> > Mark Thomas
> >>
> >>
> 
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
> > For additional commands, e-mail: dev-h...@tomcat.apache.org
> 
> 
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: dev-h...@tomcat.apache.org
> 

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to