Tomcat 又爆出两个重要漏洞

开发 后端
在此之前Tomcat和Hashtable 碰撞拒绝服务漏洞,如今Tomcat 今天又爆出两个新的重要的漏洞。Tomcat真是令人担忧,详情请看下文。

Tomcat 今天又爆出两个新的重要的漏洞,这两个漏洞分别是:

CVE-2011-337***pache Tomcat Information disclosure

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:

◆ Tomcat 7.0.0 to 7.0.21

◆ Tomcat 6.0.30 to 6.0.33

◆ Earlier versions are not affected

Description:

For performance reasons, information parsed from a request is often
cached in two places: the internal request object and the internal
processor object. These objects are not recycled at exactly the same time.
When certain errors occur that needed to be added to the access log, the
access logging process triggers the re-population of the request object
after it has been recycled. However, the request object was not recycled
before being used for the next request. That lead to information leakage
(e.g. remote IP address, HTTP headers) from the previous request to the
next request.
The issue was resolved be ensuring that the request and response objects
were recycled after being re-populated to generate the necessary access
log entries.

解决的办法:

◆  Tomcat 7.0.x 用户应该升级到 7.0.22 或者更新版本

◆ Tomcat 6.0.x 应该升级到 6.0.35 或更新版本

 

CVE-2012-0022 Apache Tomcat Denial of Service

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:

◆ Tomcat 7.0.0 to 7.0.22
◆ Tomcat 6.0.0 to 6.0.33
◆ Tomcat 5.5.0 to 5.5.34
◆ Earlier, unsupported versions may also be affected

Description:
Analysis of the recent hash collision vulnerability identified unrelated
inefficiencies with Apache Tomcat's handling of large numbers of
parameters and parameter values. These inefficiencies could allow an
attacker, via a specially crafted request, to cause large amounts of CPU
to be used which in turn could create a denial of service.
The issue was addressed by modifying the Tomcat parameter handling code
to efficiently process large numbers of parameters and parameter values.

Mitigation:

Users of affected versions should apply one of the following mitigations:

◆ Tomcat 7.0.x users should upgrade to 7.0.23 or later

◆ Tomcat 6.0.x users should upgrade to 6.0.35 or later

◆ Tomcat 5.5.x users should upgrade to 5.5.35 or later

【编辑推荐】

  1. Maven Web项目部署到Tomcat
  2. Tomcat和Hashtable 碰撞拒绝服务漏洞
  3. 将Eclipse RAP部署到Tomcat中
  4. Tomcat运行Java Web内存溢出总结
  5. Apache Tomcat 6.0.35 发布 附下载
责任编辑:林师授 来源: 51CTO
相关推荐

2018-10-17 09:47:38

微博搜索全面技术储备

2017-06-14 10:02:22

2017-06-15 17:28:36

2020-07-09 15:13:07

漏洞Spring ClouTomcat

2012-10-19 14:14:51

Ubuntu 12.1

2009-12-03 11:10:32

SMONARCHOracle

2013-03-15 10:15:21

2022-02-27 13:16:09

漏洞网络安全

2009-10-12 13:01:23

2021-04-08 09:31:45

FacebookFacebook fo漏洞

2021-10-06 13:48:50

0day漏洞攻击

2022-04-07 18:51:29

VMware漏洞网络攻击

2012-05-22 20:46:57

2019-07-11 05:53:48

MySQL死锁数据

2009-11-25 15:50:16

路由器调试

2010-08-19 11:22:19

marginpadding

2009-05-19 16:45:15

Linux安全漏洞补丁

2024-10-10 16:05:04

2024-03-06 13:27:23

2010-10-27 09:48:10

点赞
收藏

51CTO技术栈公众号