CVE-2009-0433
10.02.2009, 22:30
Unspecified vulnerability in IBM WebSphere Application Server (WAS) 5.1.x before 5.1.1.19, 6.0.x before 6.0.2.29, and 6.1.x before 6.1.0.19, when Web Server plug-in content buffering is enabled, allows attackers to cause a denial of service (daemon crash) via unknown vectors, related to a mishandling of client read failures in which clients receive many 500 HTTP error responses and backend servers are incorrectly labeled as down.Enginsight
Vendor | Product | Version |
---|---|---|
ibm | websphere_application_server | 5.1.0 |
ibm | websphere_application_server | 5.1.0.2 |
ibm | websphere_application_server | 5.1.0.3 |
ibm | websphere_application_server | 5.1.0.4 |
ibm | websphere_application_server | 5.1.0.5 |
ibm | websphere_application_server | 5.1.1 |
ibm | websphere_application_server | 5.1.1.1 |
ibm | websphere_application_server | 5.1.1.10 |
ibm | websphere_application_server | 5.1.1.11 |
ibm | websphere_application_server | 5.1.1.12 |
ibm | websphere_application_server | 5.1.1.13 |
ibm | websphere_application_server | 5.1.1.14 |
ibm | websphere_application_server | 5.1.1.15 |
ibm | websphere_application_server | 5.1.1.16 |
ibm | websphere_application_server | 5.1.1.17 |
ibm | websphere_application_server | 5.1.1.18 |
ibm | websphere_application_server | 5.1.1.19 |
ibm | websphere_application_server | 6.0 |
ibm | websphere_application_server | 6.0.0.1 |
ibm | websphere_application_server | 6.0.0.2 |
ibm | websphere_application_server | 6.0.0.3 |
ibm | websphere_application_server | 6.0.1 |
ibm | websphere_application_server | 6.0.1.1 |
ibm | websphere_application_server | 6.0.1.2 |
ibm | websphere_application_server | 6.0.1.3 |
ibm | websphere_application_server | 6.0.1.5 |
ibm | websphere_application_server | 6.0.1.7 |
ibm | websphere_application_server | 6.0.1.9 |
ibm | websphere_application_server | 6.0.1.11 |
ibm | websphere_application_server | 6.0.1.13 |
ibm | websphere_application_server | 6.0.1.15 |
ibm | websphere_application_server | 6.0.1.17 |
ibm | websphere_application_server | 6.0.2 |
ibm | websphere_application_server | 6.0.2.1 |
ibm | websphere_application_server | 6.0.2.2 |
ibm | websphere_application_server | 6.0.2.3 |
ibm | websphere_application_server | 6.0.2.4 |
ibm | websphere_application_server | 6.0.2.5 |
ibm | websphere_application_server | 6.0.2.6 |
ibm | websphere_application_server | 6.0.2.7 |
ibm | websphere_application_server | 6.0.2.9 |
ibm | websphere_application_server | 6.0.2.11 |
ibm | websphere_application_server | 6.0.2.13 |
ibm | websphere_application_server | 6.0.2.15 |
ibm | websphere_application_server | 6.0.2.17 |
ibm | websphere_application_server | 6.0.2.19 |
ibm | websphere_application_server | 6.0.2.22 |
ibm | websphere_application_server | 6.0.2.23 |
ibm | websphere_application_server | 6.0.2.24 |
ibm | websphere_application_server | 6.0.2.25 |
ibm | websphere_application_server | 6.0.2.27 |
ibm | websphere_application_server | 6.0.2.28 |
ibm | websphere_application_server | 6.1 |
ibm | websphere_application_server | 6.1.0 |
ibm | websphere_application_server | 6.1.0.0 |
ibm | websphere_application_server | 6.1.0.1 |
ibm | websphere_application_server | 6.1.0.2 |
ibm | websphere_application_server | 6.1.0.3 |
ibm | websphere_application_server | 6.1.0.4 |
ibm | websphere_application_server | 6.1.0.5 |
ibm | websphere_application_server | 6.1.0.6 |
ibm | websphere_application_server | 6.1.0.7 |
ibm | websphere_application_server | 6.1.0.8 |
ibm | websphere_application_server | 6.1.0.9 |
ibm | websphere_application_server | 6.1.0.10 |
ibm | websphere_application_server | 6.1.0.11 |
ibm | websphere_application_server | 6.1.0.12 |
ibm | websphere_application_server | 6.1.0.13 |
ibm | websphere_application_server | 6.1.0.14 |
ibm | websphere_application_server | 6.1.0.15 |
ibm | websphere_application_server | 6.1.0.16 |
ibm | websphere_application_server | 6.1.0.17 |
ibm | websphere_application_server | 6.1.0.18 |
𝑥
= Vulnerable software versions
References