ID

VAR-200906-0603


CVE

CVE-2008-5515


TITLE

Apache Tomcat information disclosure vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2009-000036

DESCRIPTION

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request. Apache Tomcat from The Apache Software Foundation contains an information disclosure vulnerability. Apache Tomcat from the Apache Software Foundation is an implementation of the Java Servlet and JavaServer Page (JSP) technologies. Apache Tomcat contains a vulnerability which may allow information disclosure or access to the contents contained in the WEB-INF directory. According to the developer, unsupported Apache Tomcat 3.x, 4.0.x, and 5.0.x may also be affected. For more information, refer to the developer's website. Minehiko Iida and Yuichiro Suzuki of Development Dept. II Application Management Middleware Div. FUJITSU LIMITED reported this vulnerability to IPA. JPCERT/CC coordinated with The Apache Software Foundation and the vendors under Information Security Early Warning Partnership.A remote attacker could possibly obtain information such as configuration or user credentials contained in the application which resides under the WEB-INF directory. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks. Modification, Denial of Service (DoS) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c02515878 Version: 1 HPSBUX02579 SSRT100203 rev.1 - HP-UX Apache Running Tomcat Servlet Engine, Remote Information Disclosure, Unauthorized Modification, Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2010-11-23 Last Updated: 2010-11-23 ------------------------------------------------------------------------------ Potential Security Impact: Remote information disclosure, unauthorized modification, or Denial of Service (DoS). Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX Apache Running Tomcat Servlet Engine. These vulnerabilities could be exploited remotely to disclose information, allows unauthorized modification, or create a Denial of Service (DoS). The Tomcat-based Servlet Engine is contained in the HP-UX Apache Web Server Suite. References: CVE-2010-2227, CVE-2010-1157, CVE-2009-0783, CVE-2009-0781, CVE-2009-0580, CVE-2009-0033, CVE-2008-5515 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.12 or earlier BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2010-2227 (AV:N/AC:L/Au:N/C:P/I:N/A:P) 6.4 CVE-2010-1157 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2009-0783 (AV:L/AC:L/Au:N/C:P/I:P/A:N) 3.6 CVE-2009-0781 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2009-0580 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2009-0033 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2008-5515 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following software updates to resolve the vulnerabilities. The updates are available for download from http://software.hp.com Note: HP-UX Web Server Suite v3.13 contains HP-UX Tomcat-based Servlet Engine v5.5.30.01 Web Server Suite Version / Apache Depot name HP-UX Web Server Suite v.3.13 HPUXWS22ATW-B313-32.depot HPUXWS22ATW-B313-64.depot MANUAL ACTIONS: Yes - Update Install HP-UX Web Server Suite v3.13 or subsequent. PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX Web Server Suite HP-UX B.11.23 HP-UX B.11.31 ================== hpuxws22TOMCAT.TOMCAT action: install revision B.5.5.30.01 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 23 November 2010 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." Copyright 2010 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkzsg8IACgkQ4B86/C0qfVlFEQCg1wPaYQ84EkeiOjNAkrLGPVnQ 1aQAoK/qC5XheL13hyynXvA/jfWdKwQ0 =jKnI -----END PGP SIGNATURE----- . Further details on the individual security issues can be found at http://tomcat.apache.org/security-5.html. For the oldstable distribution (lenny), this problem has been fixed in version 5.5.26-5lenny2. The stable distribution (squeeze) no longer contains tomcat5.5. tomcat6 is already fixed. The unstable distribution (sid) no longer contains tomcat5.5. tomcat6 is already fixed. =========================================================== Ubuntu Security Notice USN-788-1 June 15, 2009 tomcat6 vulnerabilities CVE-2008-5515, CVE-2009-0033, CVE-2009-0580, CVE-2009-0781, CVE-2009-0783 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 8.10 Ubuntu 9.04 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 8.10: libtomcat6-java 6.0.18-0ubuntu3.2 tomcat6-examples 6.0.18-0ubuntu3.2 Ubuntu 9.04: libtomcat6-java 6.0.18-0ubuntu6.1 tomcat6-examples 6.0.18-0ubuntu6.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Iida Minehiko discovered that Tomcat did not properly normalise paths. A remote attacker could send specially crafted requests to the server and bypass security restrictions, gaining access to sensitive content. (CVE-2008-5515) Yoshihito Fukuyama discovered that Tomcat did not properly handle errors when the Java AJP connector and mod_jk load balancing are used. (CVE-2009-0033) D. Matscheko and T. A remote attacker could exploit this in order to enumerate valid usernames. (CVE-2009-0580) Deniz Cevik discovered that Tomcat did not properly escape certain parameters in the example calendar application which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data (such as passwords), within the same domain. Local users could exploit this to bypass security restrictions and gain access to certain sensitive files. (CVE-2009-0783) Updated packages for Ubuntu 8.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18-0ubuntu3.2.diff.gz Size/MD5: 22010 87c6105cd78ea5a8dbf62054fc4ba0aa http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18-0ubuntu3.2.dsc Size/MD5: 1378 823c008ffc927c0f3f5686fc6f5188d0 http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18.orig.tar.gz Size/MD5: 3484249 9bdbb1c1d79302c80057a70b18fe6721 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/libservlet2.5-java_6.0.18-0ubuntu3.2_all.deb Size/MD5: 174164 dd24331b2709bd6641b4055d0b052eae http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/libtomcat6-java_6.0.18-0ubuntu3.2_all.deb Size/MD5: 2961944 63c8c3e0300ed70a240b79ddd3299efb http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-admin_6.0.18-0ubuntu3.2_all.deb Size/MD5: 37370 b9b1bd6dc9cfb52107811295401c09e4 http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-common_6.0.18-0ubuntu3.2_all.deb Size/MD5: 53488 5006e5c394ec815f6d36c335d9f0abaf http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-docs_6.0.18-0ubuntu3.2_all.deb Size/MD5: 714516 768cacbb74453b1a2a49e55d61b7bedd http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-examples_6.0.18-0ubuntu3.2_all.deb Size/MD5: 419180 0663de0611fb9792d44aebad8aa24cc4 http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-user_6.0.18-0ubuntu3.2_all.deb Size/MD5: 18612 95544319007f1f90321469c5d314c72e http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18-0ubuntu3.2_all.deb Size/MD5: 24156 9f4d7a0671e9330ff2fa1a1c13a20c58 Updated packages for Ubuntu 9.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18-0ubuntu6.1.diff.gz Size/MD5: 24779 221e0f51259495fd01da2a6b67358b17 http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18-0ubuntu6.1.dsc Size/MD5: 1411 e3bac3c39b2e6db3267699a533b17add http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18.orig.tar.gz Size/MD5: 3484249 9bdbb1c1d79302c80057a70b18fe6721 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/libservlet2.5-java-doc_6.0.18-0ubuntu6.1_all.deb Size/MD5: 246196 54e990e7893923b8b6df4bcce9f3ba22 http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/libservlet2.5-java_6.0.18-0ubuntu6.1_all.deb Size/MD5: 172500 abf989790a45def65d5de9a7f9b010df http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/libtomcat6-java_6.0.18-0ubuntu6.1_all.deb Size/MD5: 2846254 c1c0180751500ce58c51b97de9f2d6d9 http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-admin_6.0.18-0ubuntu6.1_all.deb Size/MD5: 37874 e7d401faba215af22ecff31b4a675fad http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-common_6.0.18-0ubuntu6.1_all.deb Size/MD5: 53184 194153ab21adac9a47baaf92ea8d2acb http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-docs_6.0.18-0ubuntu6.1_all.deb Size/MD5: 714212 d52e9abc75108a8f059346e09d47b511 http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-examples_6.0.18-0ubuntu6.1_all.deb Size/MD5: 418316 3a7110c9da4bd72a7019cbb75651da73 http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-user_6.0.18-0ubuntu6.1_all.deb Size/MD5: 20520 ea5e54c91e7055e281d61e63f0e140f2 http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18-0ubuntu6.1_all.deb Size/MD5: 24952 ec80f910d6c8e606c090ba8dd737bc4c . Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-servers/tomcat *< 5.5.34 *>= 6.0.35 *< 6.0.35 >= 7.0.23 < 7.0.23 Description =========== Multiple vulnerabilities have been discovered in Apache Tomcat. Please review the CVE identifiers referenced below for details. Impact ====== The vulnerabilities allow an attacker to cause a Denial of Service, to hijack a session, to bypass authentication, to inject webscript, to enumerate valid usernames, to read, modify and overwrite arbitrary files, to bypass intended access restrictions, to delete work-directory files, to discover the server's hostname or IP, to bypass read permissions for files or HTTP headers, to read or write files outside of the intended working directory, and to obtain sensitive information by reading a log file. Workaround ========== There is no known workaround at this time. Resolution ========== All Apache Tomcat 6.0.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/tomcat-6.0.35" All Apache Tomcat 7.0.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/tomcat-7.0.23" References ========== [ 1 ] CVE-2008-5515 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5515 [ 2 ] CVE-2009-0033 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0033 [ 3 ] CVE-2009-0580 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0580 [ 4 ] CVE-2009-0781 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0781 [ 5 ] CVE-2009-0783 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0783 [ 6 ] CVE-2009-2693 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2693 [ 7 ] CVE-2009-2901 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2901 [ 8 ] CVE-2009-2902 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2902 [ 9 ] CVE-2010-1157 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1157 [ 10 ] CVE-2010-2227 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2227 [ 11 ] CVE-2010-3718 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3718 [ 12 ] CVE-2010-4172 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4172 [ 13 ] CVE-2010-4312 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4312 [ 14 ] CVE-2011-0013 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0013 [ 15 ] CVE-2011-0534 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0534 [ 16 ] CVE-2011-1088 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1088 [ 17 ] CVE-2011-1183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1183 [ 18 ] CVE-2011-1184 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1184 [ 19 ] CVE-2011-1419 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1419 [ 20 ] CVE-2011-1475 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1475 [ 21 ] CVE-2011-1582 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1582 [ 22 ] CVE-2011-2204 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2204 [ 23 ] CVE-2011-2481 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2481 [ 24 ] CVE-2011-2526 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2526 [ 25 ] CVE-2011-2729 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2729 [ 26 ] CVE-2011-3190 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3190 [ 27 ] CVE-2011-3375 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3375 [ 28 ] CVE-2011-4858 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4858 [ 29 ] CVE-2011-5062 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5062 [ 30 ] CVE-2011-5063 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5063 [ 31 ] CVE-2011-5064 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5064 [ 32 ] CVE-2012-0022 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0022 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201206-24.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2010:176 http://www.mandriva.com/security/ _______________________________________________________________________ Package : tomcat5 Date : September 12, 2010 Affected: 2008.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been found and corrected in tomcat5: Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) \%5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385 (CVE-2007-5333). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header (CVE-2009-0033). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a \% (percent) value for the j_password parameter (CVE-2009-0580). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application (CVE-2009-0783). (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry (CVE-2009-2693). Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply (CVE-2010-1157). Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with recycling of a buffer. (CVE-2010-2227) Packages for 2008.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490 The updated packages have been patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5515 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0033 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0580 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1157 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2227 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: b7ec529ef67655e138bb9845381dafe0 2008.0/i586/tomcat5-5.5.23-9.2.10.3mdv2008.0.i586.rpm 7480f62988c594c5e963968a5d8a760c 2008.0/i586/tomcat5-admin-webapps-5.5.23-9.2.10.3mdv2008.0.i586.rpm 81f00d0be9c8fad809640b83015fd73e 2008.0/i586/tomcat5-common-lib-5.5.23-9.2.10.3mdv2008.0.i586.rpm 5e2b03d332177ca8f1b59b672e568028 2008.0/i586/tomcat5-jasper-5.5.23-9.2.10.3mdv2008.0.i586.rpm fd942acf4a4b56c678cf8dc46b3cf23b 2008.0/i586/tomcat5-jasper-javadoc-5.5.23-9.2.10.3mdv2008.0.i586.rpm 482cfd3a9f47ccfc8ed33e29918bd131 2008.0/i586/tomcat5-jsp-2.0-api-5.5.23-9.2.10.3mdv2008.0.i586.rpm 97a9df65785526f25233c22c1c077eab 2008.0/i586/tomcat5-jsp-2.0-api-javadoc-5.5.23-9.2.10.3mdv2008.0.i586.rpm cb9a2042c893f1818bef3fdec427da8b 2008.0/i586/tomcat5-server-lib-5.5.23-9.2.10.3mdv2008.0.i586.rpm 41e632f8c33e4c0d0d8106fbd4b1448f 2008.0/i586/tomcat5-servlet-2.4-api-5.5.23-9.2.10.3mdv2008.0.i586.rpm 9c9ae10e58d6cf12b64400d3ba3c8895 2008.0/i586/tomcat5-servlet-2.4-api-javadoc-5.5.23-9.2.10.3mdv2008.0.i586.rpm 9967a35bf6a073e8a8509da3c5a42559 2008.0/i586/tomcat5-webapps-5.5.23-9.2.10.3mdv2008.0.i586.rpm 723023ef6f65aee545713e42809d5b86 2008.0/SRPMS/tomcat5-5.5.23-9.2.10.3mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 4b424c91fb912dc8d58ecfaf887a730c 2008.0/x86_64/tomcat5-5.5.23-9.2.10.3mdv2008.0.x86_64.rpm ca5003fcc1480d072729f2e3a01f374c 2008.0/x86_64/tomcat5-admin-webapps-5.5.23-9.2.10.3mdv2008.0.x86_64.rpm 83c84b3c3543e561be43c439931432e5 2008.0/x86_64/tomcat5-common-lib-5.5.23-9.2.10.3mdv2008.0.x86_64.rpm e2a2adee1147b24791cdbc9612bbf812 2008.0/x86_64/tomcat5-jasper-5.5.23-9.2.10.3mdv2008.0.x86_64.rpm a31a7de061b6d692924e2be3b3ee2a9c 2008.0/x86_64/tomcat5-jasper-javadoc-5.5.23-9.2.10.3mdv2008.0.x86_64.rpm 42dff6a2eecaeb735dae70ffa28bfd83 2008.0/x86_64/tomcat5-jsp-2.0-api-5.5.23-9.2.10.3mdv2008.0.x86_64.rpm 31da50a7f741eee25f7d3920ece1531c 2008.0/x86_64/tomcat5-jsp-2.0-api-javadoc-5.5.23-9.2.10.3mdv2008.0.x86_64.rpm 1670728be5615301bb60b2b01b993a1e 2008.0/x86_64/tomcat5-server-lib-5.5.23-9.2.10.3mdv2008.0.x86_64.rpm ee4c0935479f16f258c78ba2c5225e84 2008.0/x86_64/tomcat5-servlet-2.4-api-5.5.23-9.2.10.3mdv2008.0.x86_64.rpm 3383de2b3f2953ee01020d9b502900b3 2008.0/x86_64/tomcat5-servlet-2.4-api-javadoc-5.5.23-9.2.10.3mdv2008.0.x86_64.rpm b4fcecfae58187c2e0f644f569969ca6 2008.0/x86_64/tomcat5-webapps-5.5.23-9.2.10.3mdv2008.0.x86_64.rpm 723023ef6f65aee545713e42809d5b86 2008.0/SRPMS/tomcat5-5.5.23-9.2.10.3mdv2008.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFMjL+MmqjQ0CJFipgRAu5tAJ9opOdrTTLzYdyAcuZx+7WfwtcLbQCeOTn4 cZE6uUZ95kih/bicVxL4f/c= =OWxp -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . The calendar application in the examples web application contains an XSS flaw due to invalid HTML which renders the XSS filtering protection ineffective (CVE-2009-0781). References: CVE-2008-5515, CVE-2009-0033, CVE-2009-0580, CVE-2009-0781, CVE-2009-0783

Trust: 2.7

sources: NVD: CVE-2008-5515 // JVNDB: JVNDB-2009-000036 // BID: 35263 // VULMON: CVE-2008-5515 // PACKETSTORM: 96122 // PACKETSTORM: 99870 // PACKETSTORM: 78409 // PACKETSTORM: 114139 // PACKETSTORM: 89679 // PACKETSTORM: 93755 // PACKETSTORM: 79715 // PACKETSTORM: 82165

AFFECTED PRODUCTS

vendor:apachemodel:tomcatscope:eqversion:4.1.22

Trust: 1.6

vendor:apachemodel:tomcatscope:eqversion:4.1.18

Trust: 1.6

vendor:apachemodel:tomcatscope:eqversion:4.1.17

Trust: 1.6

vendor:apachemodel:tomcatscope:eqversion:4.1.23

Trust: 1.6

vendor:apachemodel:tomcatscope:eqversion:4.1.20

Trust: 1.6

vendor:apachemodel:tomcatscope:eqversion:4.1.26

Trust: 1.6

vendor:apachemodel:tomcatscope:eqversion:4.1.19

Trust: 1.6

vendor:apachemodel:tomcatscope:eqversion:4.1.25

Trust: 1.6

vendor:apachemodel:tomcatscope:eqversion:4.1.21

Trust: 1.6

vendor:apachemodel:tomcatscope:eqversion:4.1.2

Trust: 1.6

vendor:apachemodel:tomcatscope:eqversion:6.0.18

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.16

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.15

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.14

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.13

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.12

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.10

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.9

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.7

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.6

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.5

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.4

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.3

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.2

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0.1

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:6.0

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.27

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.26

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.25

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.24

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.23

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.22

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.21

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.20

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.19

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.18

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.17

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.16

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.15

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.14

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.13

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.12

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.11

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.10

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.2

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:5.5.1

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.39

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.38

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.37

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.36

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.35

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.34

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.32

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.31

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.30

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.29

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.28

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.24

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.12

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.10

Trust: 1.3

vendor:apachemodel:tomcatscope:eqversion:4.1.3

Trust: 1.3

vendor:vmwaremodel:virtualcenterscope:eqversion:2.0.2

Trust: 1.1

vendor:vmwaremodel:virtualcenterscope:eqversion:2.5

Trust: 1.1

vendor:vmwaremodel:vcenterscope:eqversion:4.0

Trust: 1.1

vendor:apachemodel:tomcatscope:eqversion:6.0.0

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:5.5.3

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:5.5.9

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:4.1.27

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:5.5.0

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:5.5.6

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:4.1.16

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:5.5.7

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:4.1.15

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:4.1.0

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:5.5.4

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:4.1.13

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:4.1.33

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:4.1.1

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:6.0.17

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:4.1.11

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:5.5.8

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:4.1.14

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:5.5.5

Trust: 1.0

vendor:apachemodel:tomcatscope:eqversion:4.1.0 to 4.1.39

Trust: 0.8

vendor:apachemodel:tomcatscope:eqversion:5.5.0 to 5.5.27

Trust: 0.8

vendor:apachemodel:tomcatscope:eqversion:6.0.0 to 6.0.18

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6 through v10.6.2

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.1

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86-64)

Trust: 0.8

vendor:fujitsumodel:interstage application framework suitescope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage application serverscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage apworksscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage business application serverscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage job workload serverscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage studioscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage web serverscope: - version: -

Trust: 0.8

vendor:hewlett packard l pmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packard l pmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:hewlett packard l pmodel:hp-uxscope:eqversion:11.31

Trust: 0.8

vendor:hewlett packard l pmodel:hp-ux tomcat-based servlet enginescope:eqversion:before 5.5.30.01

Trust: 0.8

vendor:necmodel:infoframe documentskipperscope: - version: -

Trust: 0.8

vendor:necmodel:mconescope: - version: -

Trust: 0.8

vendor:necmodel:websam securemasterscope: - version: -

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:enterprise linux eusscope:eqversion:5.3.z (server)

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:sun microsystemsmodel:opensolarisscope:eqversion:(sparc)

Trust: 0.8

vendor:sun microsystemsmodel:opensolarisscope:eqversion:(x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (x86)

Trust: 0.8

vendor:vmwaremodel:esxscope:eqversion:3.0.3

Trust: 0.8

vendor:vmwaremodel:esxscope:eqversion:3.5

Trust: 0.8

vendor:vmwaremodel:esxscope:eqversion:4.0

Trust: 0.8

vendor:vmwaremodel:serverscope:eqversion:2.x

Trust: 0.8

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.55

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.52

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.51

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.0.25

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.0.24

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.0.23

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.0.22

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.0.21

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:2.0.2

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:2.0.1

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:2.0

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.3

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.2

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.1

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:4.0

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.5

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.04

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:8.10

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 9 sparcscope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 99scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 96scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 95scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 94scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 93scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 92scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 91scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 90scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 89scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 88scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 87scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 86scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 85scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 84scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 83scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 82scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 81scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 80scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 78scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 77scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 76scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 68scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 67scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 64scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 61scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 59scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 58scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 57scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 54scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 50scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 49scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 47scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 45scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 41scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 39scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 36scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 29scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 22scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 19scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 13scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 117scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 116scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 115scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 114scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 113scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 112scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 111ascope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 111scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 110scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 109scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 108scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 107scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 106scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 105scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 104scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 103scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 102scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 101ascope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 101scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 100scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 02scope: - version: -

Trust: 0.3

vendor:sunmodel:opensolaris build snv 01scope: - version: -

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for novell groupwisescope:eqversion:5.0.1

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for novell groupwisescope:eqversion:4.1.7

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for novell groupwisescope:eqversion:4.1.4

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchange mr1scope:eqversion:5.0.2

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchangescope:eqversion:5.0.2

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchangescope:eqversion:5.0.1

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchange sp2scope:eqversion:5.0

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchangescope:eqversion:5.0

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchangescope:eqversion:4.1.7

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for exchangescope:eqversion:4.1.4

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for domino mr1scope:eqversion:5.0.2

Trust: 0.3

vendor:rimmodel:blackberry enterprise server for dominoscope:eqversion:4.1.4

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for exchange mr1scope:eqversion:5.0.2

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for exchangescope:eqversion:5.0.2

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for exchangescope:eqversion:5.0.1

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for exchangescope:eqversion:4.1.4

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for domino mr1scope:eqversion:5.0.2

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for dominoscope:eqversion:5.0.2

Trust: 0.3

vendor:rimmodel:blackberry enterprise server express for dominoscope:eqversion:4.1.4

Trust: 0.3

vendor:redhatmodel:red hat network satellite (for rhelscope:eqversion:4)5.1

Trust: 0.3

vendor:redhatmodel:network satellitescope:eqversion:45.3

Trust: 0.3

vendor:redhatmodel:network satellitescope:eqversion:45.2

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server el4scope:eqversion:0

Trust: 0.3

vendor:redhatmodel:jboss enterprise web serverscope:eqversion:5.0

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform el5scope:eqversion:4.3

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform el4scope:eqversion:4.3

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platformscope:eqversion:4.3

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform el5scope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform el4scope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platformscope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:enterprise linux eus 5.3.z serverscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:developer suite as4scope:eqversion:3

Trust: 0.3

vendor:redhatmodel:certificate serverscope:eqversion:7.3

Trust: 0.3

vendor:redhatmodel:application server ws4scope:eqversion:2

Trust: 0.3

vendor:redhatmodel:application server es4scope:eqversion:2

Trust: 0.3

vendor:redhatmodel:application server as4scope:eqversion:2

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:tivoli netcool/webtop fix packscope:eqversion:2.19

Trust: 0.3

vendor:ibmmodel:tivoli netcool/webtop fix packscope:eqversion:2.15

Trust: 0.3

vendor:ibmmodel:tivoli netcool/webtop fix packscope:eqversion:2.14

Trust: 0.3

vendor:ibmmodel:tivoli netcool/webtopscope:eqversion:2.1

Trust: 0.3

vendor:ibmmodel:rational quality managerscope:eqversion:2.0

Trust: 0.3

vendor:hpmodel:performance managerscope:eqversion:8.21

Trust: 0.3

vendor:hpmodel:performance managerscope:eqversion:8.20

Trust: 0.3

vendor:hpmodel:performance managerscope:eqversion:8.10

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.22

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.21

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.18

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.17

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.12

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.10

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:8.0.1

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:8.0.1

Trust: 0.3

vendor:fujitsumodel:interstage business application server enterprisescope:eqversion:8.0.0

Trust: 0.3

vendor:fujitsumodel:interstage apworks modelers-j editionscope:eqversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage apworks modelers-j edition 6.0ascope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage apworks modelers-j editionscope:eqversion:6.0

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition ascope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0.2

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0.1

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0

Trust: 0.3

vendor:fujitsumodel:interstage application server plus developerscope:eqversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage application server plus developerscope:eqversion:6.0

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:7.0.1

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:6.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition ascope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0.2

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0.1

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:7.0.1

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 0.3

vendor:bluemodel:coat systems intelligence centerscope:eqversion:3.2.1

Trust: 0.3

vendor:bluemodel:coat systems intelligence centerscope:eqversion:3.1.2

Trust: 0.3

vendor:bluemodel:coat systems intelligence centerscope:eqversion:3.1.1

Trust: 0.3

vendor:bluemodel:coat systems intelligence centerscope:eqversion:2.1.2

Trust: 0.3

vendor:bluemodel:coat systems intelligence centerscope:eqversion:2.1.1

Trust: 0.3

vendor:bluemodel:coat systems intelligence centerscope:eqversion:2.1

Trust: 0.3

vendor:bluemodel:coat systems intelligence centerscope:eqversion:2.0.1

Trust: 0.3

vendor:bluemodel:coat systems intelligence centerscope:eqversion:2.0

Trust: 0.3

vendor:bluemodel:coat systems intelligence centerscope:eqversion:3.2

Trust: 0.3

vendor:bluemodel:coat systems intelligence centerscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.11

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.8

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5

Trust: 0.3

vendor:apachemodel:tomcat betascope:eqversion:4.1.3

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:neversion:2.56

Trust: 0.3

vendor:vmwaremodel:vcenter updatescope:neversion:4.01

Trust: 0.3

vendor:sunmodel:opensolaris build snv 118scope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli netcool/webtop fix packscope:neversion:2.110

Trust: 0.3

vendor:ibmmodel:rational quality managerscope:neversion:2.0.1

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:neversion:3.13

Trust: 0.3

vendor:bluemodel:coat systems intelligence centerscope:neversion:3.2.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.3

Trust: 0.3

vendor:apachemodel:tomcatscope:neversion:6.0.20

Trust: 0.3

vendor:apachemodel:tomcatscope:neversion:5.5.28

Trust: 0.3

vendor:apachemodel:tomcatscope:neversion:4.1.40

Trust: 0.3

sources: BID: 35263 // JVNDB: JVNDB-2009-000036 // CNNVD: CNNVD-200906-265 // NVD: CVE-2008-5515

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-5515
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2009-000036
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200906-265
value: MEDIUM

Trust: 0.6

VULMON: CVE-2008-5515
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-5515
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

IPA: JVNDB-2009-000036
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: VULMON: CVE-2008-5515 // JVNDB: JVNDB-2009-000036 // CNNVD: CNNVD-200906-265 // NVD: CVE-2008-5515

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.0

problemtype:CWE-200

Trust: 0.8

sources: JVNDB: JVNDB-2009-000036 // NVD: CVE-2008-5515

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 93755 // CNNVD: CNNVD-200906-265

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-200906-265

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-000036

PATCH

title:Security Updatesurl:http://tomcat.apache.org/security

Trust: 0.8

title:Apache Tomcat 6.x vulnerabilitiesurl:http://tomcat.apache.org/security-6.html

Trust: 0.8

title:Apache Tomcat 5.x vulnerabilitiesurl:http://tomcat.apache.org/security-5.html

Trust: 0.8

title:Apache Tomcat 4.x vulnerabilitiesurl:http://tomcat.apache.org/security-4.html

Trust: 0.8

title:HT4077url:http://support.apple.com/kb/HT4077

Trust: 0.8

title:tomcat5-5.5.23-0jpp.7.2.1AXS3url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=725

Trust: 0.8

title:JVN#63832775url:http://software.fujitsu.com/jp/security/vulnerabilities/jvn-63832775.html

Trust: 0.8

title:interstage-200902url:http://www.fujitsu.com/global/support/software/security/products-f/interstage-200902e.html

Trust: 0.8

title:HPUXWSATW313url:https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=HPUXWSATW313

Trust: 0.8

title:HPSBUX02579url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02515878

Trust: 0.8

title:HPSBUX02466url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01908935

Trust: 0.8

title:1794url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1794

Trust: 0.8

title:NV09-008url:http://www.nec.co.jp/security-info/secinfo/nv09-008.html

Trust: 0.8

title:RHSA-2009:1164url:https://rhn.redhat.com/errata/RHSA-2009-1164.html

Trust: 0.8

title:Multiple vulnerabilities in Oracle Java Web Consoleurl:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_oracle_java1

Trust: 0.8

title:263529url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-263529-1

Trust: 0.8

title:VMSA-2009-0016url:http://www.vmware.com/security/advisories/VMSA-2009-0016.html

Trust: 0.8

title:Red Hat: Important: JBoss Enterprise Application Platform 4.3.0.CP05 updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20091145 - Security Advisory

Trust: 0.1

title:Red Hat: Important: tomcat security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20091164 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: tomcat6 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-788-1

Trust: 0.1

title:Debian CVElist Bug Report Logs: CVE-2009-0033 CVE-2009-0580 CVE-2009-0783 CVE-2009-0781: Apache Tomcat 6 Multiple Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=ac49c4dcad19730a5b7d72eba69e3550

Trust: 0.1

title:Debian CVElist Bug Report Logs: CVE-2009-0033 CVE-2009-0580 CVE-2009-0783 CVE-2009-0781: Apache Tomcat 5 Multiple Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=b4688be3241a5693241135af6523bb48

Trust: 0.1

title:Symantec Security Advisories: SA66 : Multiple Tomcat vulnerabilities in IntelligenceCenterurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=ce6312b51b7767e26422e4b3dbf8f5cd

Trust: 0.1

title:VMware Security Advisories: VMware vCenter and ESX update release and vMA patch release address multiple security issues in third party components.url:https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories&qid=4675848a694e2124743f676a2c827ef7

Trust: 0.1

sources: VULMON: CVE-2008-5515 // JVNDB: JVNDB-2009-000036

EXTERNAL IDS

db:NVDid:CVE-2008-5515

Trust: 3.6

db:BIDid:35263

Trust: 2.8

db:JVNid:JVN63832775

Trust: 2.5

db:VUPENid:ADV-2009-1520

Trust: 2.4

db:SECUNIAid:44183

Trust: 1.7

db:SECUNIAid:35685

Trust: 1.7

db:SECUNIAid:35393

Trust: 1.7

db:SECUNIAid:37460

Trust: 1.7

db:SECUNIAid:39317

Trust: 1.7

db:SECUNIAid:42368

Trust: 1.7

db:SECUNIAid:35788

Trust: 1.7

db:VUPENid:ADV-2010-3056

Trust: 1.6

db:VUPENid:ADV-2009-1535

Trust: 1.6

db:VUPENid:ADV-2009-1856

Trust: 1.6

db:VUPENid:ADV-2009-3316

Trust: 1.6

db:JVNDBid:JVNDB-2009-000036

Trust: 0.8

db:CNNVDid:CNNVD-200906-265

Trust: 0.6

db:VUPENid:2009/1856

Trust: 0.1

db:VUPENid:2009/3316

Trust: 0.1

db:VUPENid:2009/1520

Trust: 0.1

db:VUPENid:2010/3056

Trust: 0.1

db:VUPENid:2009/1535

Trust: 0.1

db:VULMONid:CVE-2008-5515

Trust: 0.1

db:PACKETSTORMid:96122

Trust: 0.1

db:PACKETSTORMid:99870

Trust: 0.1

db:PACKETSTORMid:78409

Trust: 0.1

db:PACKETSTORMid:114139

Trust: 0.1

db:PACKETSTORMid:89679

Trust: 0.1

db:PACKETSTORMid:93755

Trust: 0.1

db:PACKETSTORMid:79715

Trust: 0.1

db:PACKETSTORMid:82165

Trust: 0.1

sources: VULMON: CVE-2008-5515 // BID: 35263 // JVNDB: JVNDB-2009-000036 // PACKETSTORM: 96122 // PACKETSTORM: 99870 // PACKETSTORM: 78409 // PACKETSTORM: 114139 // PACKETSTORM: 89679 // PACKETSTORM: 93755 // PACKETSTORM: 79715 // PACKETSTORM: 82165 // CNNVD: CNNVD-200906-265 // NVD: CVE-2008-5515

REFERENCES

url:http://www.securityfocus.com/bid/35263

Trust: 3.2

url:http://www.vupen.com/english/advisories/2009/1520

Trust: 2.5

url:http://www.vmware.com/security/advisories/vmsa-2009-0016.html

Trust: 2.3

url:http://www.debian.org/security/2011/dsa-2207

Trust: 2.3

url:http://tomcat.apache.org/security-5.html

Trust: 2.1

url:http://tomcat.apache.org/security-4.html

Trust: 2.0

url:http://tomcat.apache.org/security-6.html

Trust: 2.0

url:http://www.fujitsu.com/global/support/software/security/products-f/interstage-200902e.html

Trust: 2.0

url:http://jvn.jp/en/jp/jvn63832775/index.html

Trust: 1.7

url:http://secunia.com/advisories/35393

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1535

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdvsa-2009:138

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdvsa-2009:136

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html

Trust: 1.7

url:http://secunia.com/advisories/35685

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1856

Trust: 1.7

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1

Trust: 1.7

url:http://secunia.com/advisories/35788

Trust: 1.7

url:http://secunia.com/advisories/37460

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2009-november/msg01156.html

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2009-november/msg01246.html

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2009-november/msg01216.html

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/3316

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00001.html

Trust: 1.7

url:http://support.apple.com/kb/ht4077

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html

Trust: 1.7

url:http://secunia.com/advisories/39317

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdvsa-2010:176

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=129070310906557&w=2

Trust: 1.7

url:http://www.vupen.com/english/advisories/2010/3056

Trust: 1.7

url:http://secunia.com/advisories/42368

Trust: 1.7

url:http://secunia.com/advisories/44183

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=136485229118404&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=127420533226623&w=2

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6445

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a19452

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10422

Trust: 1.7

url:http://www.securityfocus.com/archive/1/507985/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/504202/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/504170/100/0/threaded

Trust: 1.7

url:https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3cdev.tomcat.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3cdev.tomcat.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3cdev.tomcat.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3cdev.tomcat.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3cdev.tomcat.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3cdev.tomcat.apache.org%3e

Trust: 1.6

url:https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3cdev.tomcat.apache.org%3e

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5515

Trust: 1.0

url:http://jvn.jp/en/jp/jvn63832775/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-5515

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2008-5515

Trust: 0.8

url:https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3cdev.tomcat.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3cdev.tomcat.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3cdev.tomcat.apache.org%3e

Trust: 0.7

url:https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3cdev.tomcat.apache.org%3e

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2009-0580

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2009-0033

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2009-0783

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2009-0781

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2009-2693

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2009-2902

Trust: 0.4

url:http://jakarta.apache.org/tomcat/

Trust: 0.3

url:/archive/1/504170

Trust: 0.3

url:/archive/1/504202

Trust: 0.3

url:/archive/1/507985

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-263529-1

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg27012048

Trust: 0.3

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01908935

Trust: 0.3

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c02515878

Trust: 0.3

url:http://h20566.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?javax.portlet.endcachetok=com.vignette.cachetoken&javax.portlet.prp_ba847bafb2a2d782fcbb0710b053ce01=wsrp-navigationalsta

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24025919

Trust: 0.3

url:https://kb.bluecoat.com/index?page=content&id=sa66

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2009-1164.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2009-1506.html

Trust: 0.3

url:http://www.blackberry.com/btsc/dynamickc.do?externalid=kb25966&sliceid=1&command=show&forward=nonthreadedkc&kcid=kb25966

Trust: 0.3

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.3

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.3

url:https://www.hp.com/go/swa

Trust: 0.3

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.3

url:http://secunia.com/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2010-1157

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2010-2227

Trust: 0.3

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-2901

Trust: 0.3

url:http://software.hp.com

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0033

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0783

Trust: 0.2

url:http://www.mandriva.com/security/

Trust: 0.2

url:http://www.mandriva.com/security/advisories

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0580

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/22.html

Trust: 0.1

url:https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3cdev.tomcat.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3cdev.tomcat.apache.org%3e

Trust: 0.1

url:https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3cdev.tomcat.apache.org%3e

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2009:1145

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/788-1/

Trust: 0.1

url:http://tomcat.apache.org/security-5.html.

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-user_6.0.18-0ubuntu3.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-docs_6.0.18-0ubuntu3.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/libservlet2.5-java_6.0.18-0ubuntu6.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18-0ubuntu6.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-examples_6.0.18-0ubuntu6.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-docs_6.0.18-0ubuntu6.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18-0ubuntu3.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-common_6.0.18-0ubuntu6.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18-0ubuntu6.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-user_6.0.18-0ubuntu6.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/libtomcat6-java_6.0.18-0ubuntu6.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18-0ubuntu3.2.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18-0ubuntu6.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-examples_6.0.18-0ubuntu3.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6_6.0.18-0ubuntu3.2.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/libtomcat6-java_6.0.18-0ubuntu3.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/libservlet2.5-java-doc_6.0.18-0ubuntu6.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-common_6.0.18-0ubuntu3.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/libservlet2.5-java_6.0.18-0ubuntu3.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-admin_6.0.18-0ubuntu6.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tomcat6/tomcat6-admin_6.0.18-0ubuntu3.2_all.deb

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0783

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2204

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0033

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0781

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2729

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2526

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2902

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-5062

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0534

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1183

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3718

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1475

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0534

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0013

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-5063

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3718

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1582

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4858

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3190

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4172

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-5064

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4312

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1475

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1088

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0580

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2901

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2526

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1183

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1184

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2204

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0022

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1184

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3375

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2693

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1157

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4172

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1088

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2481

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4312

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4858

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2227

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2481

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0013

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2729

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5515

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3190

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1419

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3375

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201206-24.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1582

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1419

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3548

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/patches

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2227

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2902

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2901

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5333

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5333

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2693

Trust: 0.1

url:http://store.mandriva.com/product_info.php?cpath=149&products_id=490

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1157

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0781

Trust: 0.1

sources: VULMON: CVE-2008-5515 // BID: 35263 // JVNDB: JVNDB-2009-000036 // PACKETSTORM: 96122 // PACKETSTORM: 99870 // PACKETSTORM: 78409 // PACKETSTORM: 114139 // PACKETSTORM: 89679 // PACKETSTORM: 93755 // PACKETSTORM: 79715 // PACKETSTORM: 82165 // CNNVD: CNNVD-200906-265 // NVD: CVE-2008-5515

CREDITS

Iida Minehiko

Trust: 0.6

sources: CNNVD: CNNVD-200906-265

SOURCES

db:VULMONid:CVE-2008-5515
db:BIDid:35263
db:JVNDBid:JVNDB-2009-000036
db:PACKETSTORMid:96122
db:PACKETSTORMid:99870
db:PACKETSTORMid:78409
db:PACKETSTORMid:114139
db:PACKETSTORMid:89679
db:PACKETSTORMid:93755
db:PACKETSTORMid:79715
db:PACKETSTORMid:82165
db:CNNVDid:CNNVD-200906-265
db:NVDid:CVE-2008-5515

LAST UPDATE DATE

2024-09-19T00:43:33.784000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2008-5515date:2019-03-25T00:00:00
db:BIDid:35263date:2015-04-13T22:12:00
db:JVNDBid:JVNDB-2009-000036date:2012-09-28T00:00:00
db:CNNVDid:CNNVD-200906-265date:2023-02-14T00:00:00
db:NVDid:CVE-2008-5515date:2023-02-13T02:19:34.757

SOURCES RELEASE DATE

db:VULMONid:CVE-2008-5515date:2009-06-16T00:00:00
db:BIDid:35263date:2009-06-08T00:00:00
db:JVNDBid:JVNDB-2009-000036date:2009-06-18T00:00:00
db:PACKETSTORMid:96122date:2010-11-27T18:01:33
db:PACKETSTORMid:99870date:2011-03-30T00:19:03
db:PACKETSTORMid:78409date:2009-06-15T20:42:09
db:PACKETSTORMid:114139date:2012-06-24T23:54:31
db:PACKETSTORMid:89679date:2010-05-19T06:15:08
db:PACKETSTORMid:93755date:2010-09-13T01:03:39
db:PACKETSTORMid:79715date:2009-07-28T19:23:06
db:PACKETSTORMid:82165date:2009-10-23T18:16:10
db:CNNVDid:CNNVD-200906-265date:2009-06-16T00:00:00
db:NVDid:CVE-2008-5515date:2009-06-16T21:00:00.313