CVE-2008-3271
13.10.2008, 20:00
Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.Enginsight
Vendor | Product | Version |
---|---|---|
apache | tomcat | 4.1.0 |
apache | tomcat | 4.1.1 |
apache | tomcat | 4.1.2 |
apache | tomcat | 4.1.3 |
apache | tomcat | 4.1.3:beta |
apache | tomcat | 4.1.4 |
apache | tomcat | 4.1.5 |
apache | tomcat | 4.1.6 |
apache | tomcat | 4.1.7 |
apache | tomcat | 4.1.8 |
apache | tomcat | 4.1.9 |
apache | tomcat | 4.1.10 |
apache | tomcat | 4.1.11 |
apache | tomcat | 4.1.12 |
apache | tomcat | 4.1.13 |
apache | tomcat | 4.1.14 |
apache | tomcat | 4.1.15 |
apache | tomcat | 4.1.16 |
apache | tomcat | 4.1.17 |
apache | tomcat | 4.1.18 |
apache | tomcat | 4.1.19 |
apache | tomcat | 4.1.20 |
apache | tomcat | 4.1.21 |
apache | tomcat | 4.1.22 |
apache | tomcat | 4.1.23 |
apache | tomcat | 4.1.24 |
apache | tomcat | 4.1.25 |
apache | tomcat | 4.1.26 |
apache | tomcat | 4.1.27 |
apache | tomcat | 4.1.28 |
apache | tomcat | 4.1.29 |
apache | tomcat | 4.1.30 |
apache | tomcat | 4.1.31 |
apache | tomcat | 5.5.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References