Vulnerability Name:

CVE-2008-3271 (CCN-45791)

Assigned:2008-10-10
Published:2008-10-10
Updated:2023-02-13
Summary:
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2008-3271

Source: CCN
Type: JVN#30732239
Apache Tomcat allows access from a non-permitted IP address

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: JVNDB-2008-000069
Apache Tomcat allows access from a non-permitted IP address

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: RHSA-2008-1007
Low: tomcat security update for Red Hat Network Satellite Server

Source: CCN
Type: SA32213
Apache Tomcat "RemoteFilterValve" Security Bypass Security Issue

Source: CCN
Type: SA32234
FUJITSU Interstage Products Apache Tomcat Security Bypass

Source: CCN
Type: SA35684
NEC WebOTX Products "RemoteFilterValve" Security Bypass Security Issue

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: SECTRACK ID: 1021039
Tomcat May Let Remote Users Access Restricted Contexts

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: CCN
Type: Apache Tomcat Web site
Fixed in Apache Tomcat 5.5.1

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: FUJITSU Web site
Interstage Application Server: Vulnerability may allow access from a non-permitted IP address

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: NEC Web site
WebOTX

Source: CCN
Type: NV09-006
Apache Tomcat

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: BID-31698
Apache Tomcat 'RemoteFilterValve' Security Bypass Vulnerability

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: XF
Type: UNKNOWN
apache-tomcat-valve-security-bypass(45791)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: SUSE
Type: SUSE-SR:2008:023
SUSE Security Summary Report

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:apache:tomcat:4.1.10:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.24:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.15:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.28:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.31:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:5.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.18:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.19:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.20:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.21:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.22:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.23:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.26:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.27:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.29:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.30:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.16:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.13:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.25:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.17:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.9:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20083271
    V
    CVE-2008-3271
    2017-09-27
    BACK
    apache tomcat 4.1.10
    apache tomcat 4.1.0
    apache tomcat 4.1.24
    apache tomcat 4.1.1
    apache tomcat 4.1.12
    apache tomcat 4.1.15
    apache tomcat 4.1.2
    apache tomcat 4.1.28
    apache tomcat 4.1.3
    apache tomcat 4.1.3 beta
    apache tomcat 4.1.31
    apache tomcat 5.5.0
    apache tomcat 4.1.18
    apache tomcat 4.1.19
    apache tomcat 4.1.20
    apache tomcat 4.1.21
    apache tomcat 4.1.22
    apache tomcat 4.1.23
    apache tomcat 4.1.26
    apache tomcat 4.1.27
    apache tomcat 4.1.29
    apache tomcat 4.1.30
    apache tomcat 4.1.11
    apache tomcat 4.1.16
    apache tomcat 4.1.14
    apache tomcat 4.1.13
    apache tomcat 4.1.25
    apache tomcat 4.1.17
    apache tomcat 4.1.4
    apache tomcat 4.1.5
    apache tomcat 4.1.6
    apache tomcat 4.1.7
    apache tomcat 4.1.8
    apache tomcat 4.1.9