Vulnerability Name: | CVE-2008-3271 (CCN-45791) |
Assigned: | 2008-10-10 |
Published: | 2008-10-10 |
Updated: | 2023-02-13 |
Summary: | |
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N) 3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None | 2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N) 1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None |
|
Vulnerability Consequences: | Bypass Security |
References: | Source: MITRE Type: CNA CVE-2008-3271
Source: CCN Type: JVN#30732239 Apache Tomcat allows access from a non-permitted IP address
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: CCN Type: JVNDB-2008-000069 Apache Tomcat allows access from a non-permitted IP address
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: CCN Type: RHSA-2008-1007 Low: tomcat security update for Red Hat Network Satellite Server
Source: CCN Type: SA32213 Apache Tomcat "RemoteFilterValve" Security Bypass Security Issue
Source: CCN Type: SA32234 FUJITSU Interstage Products Apache Tomcat Security Bypass
Source: CCN Type: SA35684 NEC WebOTX Products "RemoteFilterValve" Security Bypass Security Issue
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: CCN Type: SECTRACK ID: 1021039 Tomcat May Let Remote Users Access Restricted Contexts
Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com
Source: CCN Type: Apache Tomcat Web site Fixed in Apache Tomcat 5.5.1
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: CCN Type: FUJITSU Web site Interstage Application Server: Vulnerability may allow access from a non-permitted IP address
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: CCN Type: NEC Web site WebOTX
Source: CCN Type: NV09-006 Apache Tomcat
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: CCN Type: BID-31698 Apache Tomcat 'RemoteFilterValve' Security Bypass Vulnerability
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: XF Type: UNKNOWN apache-tomcat-valve-security-bypass(45791)
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: SUSE Type: SUSE-SR:2008:023 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration CCN 1: cpe:/a:apache:tomcat:4.1.10:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.24:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.12:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.15:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.2:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.28:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.31:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.18:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.19:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.20:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.21:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.22:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.23:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.26:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.27:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.29:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.30:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.11:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.16:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.14:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.13:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.25:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.17:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.4:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.5:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.7:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.8:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.9:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |