CVE-2008-3271

Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
apachetomcat
4.1.0
apachetomcat
4.1.1
apachetomcat
4.1.2
apachetomcat
4.1.3
apachetomcat
4.1.3:beta
apachetomcat
4.1.4
apachetomcat
4.1.5
apachetomcat
4.1.6
apachetomcat
4.1.7
apachetomcat
4.1.8
apachetomcat
4.1.9
apachetomcat
4.1.10
apachetomcat
4.1.11
apachetomcat
4.1.12
apachetomcat
4.1.13
apachetomcat
4.1.14
apachetomcat
4.1.15
apachetomcat
4.1.16
apachetomcat
4.1.17
apachetomcat
4.1.18
apachetomcat
4.1.19
apachetomcat
4.1.20
apachetomcat
4.1.21
apachetomcat
4.1.22
apachetomcat
4.1.23
apachetomcat
4.1.24
apachetomcat
4.1.25
apachetomcat
4.1.26
apachetomcat
4.1.27
apachetomcat
4.1.28
apachetomcat
4.1.29
apachetomcat
4.1.30
apachetomcat
4.1.31
apachetomcat
5.5.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tomcat4
karmic
dne
jaunty
dne
intrepid
dne
hardy
dne
gutsy
dne
feisty
dne
dapper
ignored
tomcat5
karmic
dne
jaunty
dne
intrepid
dne
hardy
dne
gutsy
dne
feisty
ignored
dapper
ignored
tomcat5.5
karmic
dne
jaunty
not-affected
intrepid
not-affected
hardy
not-affected
gutsy
ignored
feisty
ignored
dapper
dne
Common Weakness Enumeration
References