Name | CVE-2011-3190 |
Description | Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-2401-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
tomcat6 (PTS) | jessie, jessie (lts) | 6.0.45+dfsg-1~deb8u1 | fixed |
tomcat7 (PTS) | jessie, jessie (lts) | 7.0.56-3+really7.0.109-1+deb8u6 | fixed |
stretch | 7.0.75-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
tomcat5.5 | source | (unstable) | (unfixed) | |||
tomcat6 | source | squeeze | 6.0.35-1+squeeze2 | DSA-2401-1 | ||
tomcat6 | source | (unstable) | 6.0.35-1 | |||
tomcat7 | source | (unstable) | 7.0.21-1 |