CVE-2008-3271

EUVD-2008-3259
Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
Affected Products (NVD)
VendorProductVersion
apachetomcat
4.1.0
apachetomcat
4.1.1
apachetomcat
4.1.2
apachetomcat
4.1.3
apachetomcat
4.1.3:beta
apachetomcat
4.1.4
apachetomcat
4.1.5
apachetomcat
4.1.6
apachetomcat
4.1.7
apachetomcat
4.1.8
apachetomcat
4.1.9
apachetomcat
4.1.10
apachetomcat
4.1.11
apachetomcat
4.1.12
apachetomcat
4.1.13
apachetomcat
4.1.14
apachetomcat
4.1.15
apachetomcat
4.1.16
apachetomcat
4.1.17
apachetomcat
4.1.18
apachetomcat
4.1.19
apachetomcat
4.1.20
apachetomcat
4.1.21
apachetomcat
4.1.22
apachetomcat
4.1.23
apachetomcat
4.1.24
apachetomcat
4.1.25
apachetomcat
4.1.26
apachetomcat
4.1.27
apachetomcat
4.1.28
apachetomcat
4.1.29
apachetomcat
4.1.30
apachetomcat
4.1.31
apachetomcat
5.5.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tomcat4
dapper
ignored
feisty
dne
gutsy
dne
hardy
dne
intrepid
dne
jaunty
dne
karmic
dne
tomcat5
dapper
ignored
feisty
ignored
gutsy
dne
hardy
dne
intrepid
dne
jaunty
dne
karmic
dne
tomcat5.5
dapper
dne
feisty
ignored
gutsy
ignored
hardy
not-affected
intrepid
not-affected
jaunty
not-affected
karmic
dne
Common Weakness Enumeration
References