CVE-2009-0033
05.06.2009, 16:00
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.Enginsight
| Vendor | Product | Version |
|---|---|---|
| apache | tomcat | 4.1.0 |
| apache | tomcat | 4.1.1 |
| apache | tomcat | 4.1.2 |
| apache | tomcat | 4.1.3 |
| apache | tomcat | 4.1.3:beta |
| apache | tomcat | 4.1.4 |
| apache | tomcat | 4.1.5 |
| apache | tomcat | 4.1.6 |
| apache | tomcat | 4.1.7 |
| apache | tomcat | 4.1.8 |
| apache | tomcat | 4.1.9 |
| apache | tomcat | 4.1.9:beta |
| apache | tomcat | 4.1.10 |
| apache | tomcat | 4.1.11 |
| apache | tomcat | 4.1.12 |
| apache | tomcat | 4.1.13 |
| apache | tomcat | 4.1.14 |
| apache | tomcat | 4.1.15 |
| apache | tomcat | 4.1.16 |
| apache | tomcat | 4.1.17 |
| apache | tomcat | 4.1.18 |
| apache | tomcat | 4.1.19 |
| apache | tomcat | 4.1.20 |
| apache | tomcat | 4.1.21 |
| apache | tomcat | 4.1.22 |
| apache | tomcat | 4.1.23 |
| apache | tomcat | 4.1.24 |
| apache | tomcat | 4.1.25 |
| apache | tomcat | 4.1.26 |
| apache | tomcat | 4.1.27 |
| apache | tomcat | 4.1.28 |
| apache | tomcat | 4.1.29 |
| apache | tomcat | 4.1.30 |
| apache | tomcat | 4.1.31 |
| apache | tomcat | 4.1.32 |
| apache | tomcat | 4.1.33 |
| apache | tomcat | 4.1.34 |
| apache | tomcat | 4.1.35 |
| apache | tomcat | 4.1.36 |
| apache | tomcat | 4.1.37 |
| apache | tomcat | 4.1.38 |
| apache | tomcat | 4.1.39 |
| apache | tomcat | 5.5.0 |
| apache | tomcat | 5.5.1 |
| apache | tomcat | 5.5.2 |
| apache | tomcat | 5.5.3 |
| apache | tomcat | 5.5.4 |
| apache | tomcat | 5.5.5 |
| apache | tomcat | 5.5.6 |
| apache | tomcat | 5.5.7 |
| apache | tomcat | 5.5.8 |
| apache | tomcat | 5.5.9 |
| apache | tomcat | 5.5.10 |
| apache | tomcat | 5.5.11 |
| apache | tomcat | 5.5.12 |
| apache | tomcat | 5.5.13 |
| apache | tomcat | 5.5.14 |
| apache | tomcat | 5.5.15 |
| apache | tomcat | 5.5.16 |
| apache | tomcat | 5.5.17 |
| apache | tomcat | 5.5.18 |
| apache | tomcat | 5.5.19 |
| apache | tomcat | 5.5.20 |
| apache | tomcat | 5.5.21 |
| apache | tomcat | 5.5.22 |
| apache | tomcat | 5.5.23 |
| apache | tomcat | 5.5.24 |
| apache | tomcat | 5.5.25 |
| apache | tomcat | 5.5.26 |
| apache | tomcat | 5.5.27 |
| apache | tomcat | 6.0.0 |
| apache | tomcat | 6.0.1 |
| apache | tomcat | 6.0.2 |
| apache | tomcat | 6.0.3 |
| apache | tomcat | 6.0.4 |
| apache | tomcat | 6.0.5 |
| apache | tomcat | 6.0.6 |
| apache | tomcat | 6.0.7 |
| apache | tomcat | 6.0.8 |
| apache | tomcat | 6.0.9 |
| apache | tomcat | 6.0.10 |
| apache | tomcat | 6.0.11 |
| apache | tomcat | 6.0.12 |
| apache | tomcat | 6.0.13 |
| apache | tomcat | 6.0.14 |
| apache | tomcat | 6.0.15 |
| apache | tomcat | 6.0.16 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| tomcat5 |
| ||||||||||||||||||
| tomcat5.5 |
| ||||||||||||||||||
| tomcat6 |
|
Common Weakness Enumeration
References